Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 12:38
Static task
static1
Behavioral task
behavioral1
Sample
Remittance slip 060223.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Remittance slip 060223.exe
Resource
win10v2004-20241007-en
General
-
Target
Remittance slip 060223.exe
-
Size
858KB
-
MD5
f572724244ebcdf8911c11e5b4a6ff29
-
SHA1
91ab9b959e3535e05e06d381646de113880947eb
-
SHA256
b8dbf3db5d56d847b13c3e517dd9e9e396038948ea1189e7f57c419f493c368c
-
SHA512
74fc1406fb2d5df6d07fcd02808b32afbd1d951406b5b39a5865c37d07b5262723f99173587961dfcb21835073a057d251a6f45a9f4c93f6b1d1bdcd16d248b3
-
SSDEEP
12288:0zSggsinDj1dM1o2kSYQHJbaCR+tTshb0kRSdA56SFceC+MCkQ3lo1XS+KhzbuT:0zsuiSYQ2shgk8dQ6wqC9qqI
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.starmech.net - Port:
587 - Username:
[email protected] - Password:
nics123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2304 powershell.exe 2704 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\BjTxJte = "C:\\Users\\Admin\\AppData\\Roaming\\BjTxJte\\BjTxJte.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2992 set thread context of 2200 2992 Remittance slip 060223.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remittance slip 060223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2992 Remittance slip 060223.exe 2304 powershell.exe 2992 Remittance slip 060223.exe 2992 Remittance slip 060223.exe 2704 powershell.exe 2992 Remittance slip 060223.exe 2992 Remittance slip 060223.exe 2992 Remittance slip 060223.exe 2992 Remittance slip 060223.exe 2200 RegSvcs.exe 2200 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2992 Remittance slip 060223.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2200 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2304 2992 Remittance slip 060223.exe 31 PID 2992 wrote to memory of 2304 2992 Remittance slip 060223.exe 31 PID 2992 wrote to memory of 2304 2992 Remittance slip 060223.exe 31 PID 2992 wrote to memory of 2304 2992 Remittance slip 060223.exe 31 PID 2992 wrote to memory of 2704 2992 Remittance slip 060223.exe 33 PID 2992 wrote to memory of 2704 2992 Remittance slip 060223.exe 33 PID 2992 wrote to memory of 2704 2992 Remittance slip 060223.exe 33 PID 2992 wrote to memory of 2704 2992 Remittance slip 060223.exe 33 PID 2992 wrote to memory of 2904 2992 Remittance slip 060223.exe 35 PID 2992 wrote to memory of 2904 2992 Remittance slip 060223.exe 35 PID 2992 wrote to memory of 2904 2992 Remittance slip 060223.exe 35 PID 2992 wrote to memory of 2904 2992 Remittance slip 060223.exe 35 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37 PID 2992 wrote to memory of 2200 2992 Remittance slip 060223.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remittance slip 060223.exe"C:\Users\Admin\AppData\Local\Temp\Remittance slip 060223.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Remittance slip 060223.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pZgcCZTJDPiQe.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pZgcCZTJDPiQe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1F82.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55fc8fdb735209b1b62f70094e2034a38
SHA123b829f388aa9ad121d2cc189fb1d1b9a50ea6e5
SHA256355d50f8782c8c730fac629cce98f6c847e07a7feff18748df848518bfd009d6
SHA51218218dbe69362803fd6efa62761a131ed3642c26fb6b56f58eb59f54f1ff0eb02dee87f8e9025a7866240e671678bba5d408bb8f4191a78965e81cb781e285a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57181e5e6fadc1ba99c9e39077ff7d298
SHA14de1286700ca3cbc9069576b62dc82f239a869b0
SHA2568010814cdfa494b1fe8f0ee561080041309f753e623f9432d738525e88ceec02
SHA51251f5304bc84cf3a9c9d4b3e07ed56b485c8324200451d0aaceb711592d6dfaeb941eb4729a3c433f9f6117f6ffd8faa5dfa736983e0b02cee222f732a0721b5a