Analysis
-
max time kernel
20s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation Print Out Copy MT103.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Confirmation Print Out Copy MT103.exe
Resource
win10v2004-20250314-en
General
-
Target
Payment Confirmation Print Out Copy MT103.exe
-
Size
703KB
-
MD5
e5cd98a64f8e5107f0f9ce6b90613333
-
SHA1
1f1677af3f494b8def43775a9077357b756184d7
-
SHA256
aedfae05284600f51e6fe18a6f47ac68c7971e365d827bed7bc2205f27063c8d
-
SHA512
e948219debb7790b4ffe26cb9cecd155d2aec1a03a6fd368b49335c25ee24a6805bb3be466dfa099e193630aaec89270368a5294f386c8922e70d616498de024
-
SSDEEP
12288:yMQiKaxTR1Q8QTAI8vRPc6dWy2HF5VmChmFZKt5HQveM4uHzZNKf5zBnym+FNb/:BQib1qkIGRPc6kvVmTFwt9Qp3KBNym+D
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2712 powershell.exe 2960 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1228 set thread context of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Confirmation Print Out Copy MT103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Confirmation Print Out Copy MT103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1228 Payment Confirmation Print Out Copy MT103.exe 1228 Payment Confirmation Print Out Copy MT103.exe 1556 Payment Confirmation Print Out Copy MT103.exe 1556 Payment Confirmation Print Out Copy MT103.exe 2960 powershell.exe 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1228 Payment Confirmation Print Out Copy MT103.exe Token: SeDebugPrivilege 1556 Payment Confirmation Print Out Copy MT103.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2712 1228 Payment Confirmation Print Out Copy MT103.exe 30 PID 1228 wrote to memory of 2712 1228 Payment Confirmation Print Out Copy MT103.exe 30 PID 1228 wrote to memory of 2712 1228 Payment Confirmation Print Out Copy MT103.exe 30 PID 1228 wrote to memory of 2712 1228 Payment Confirmation Print Out Copy MT103.exe 30 PID 1228 wrote to memory of 2960 1228 Payment Confirmation Print Out Copy MT103.exe 32 PID 1228 wrote to memory of 2960 1228 Payment Confirmation Print Out Copy MT103.exe 32 PID 1228 wrote to memory of 2960 1228 Payment Confirmation Print Out Copy MT103.exe 32 PID 1228 wrote to memory of 2960 1228 Payment Confirmation Print Out Copy MT103.exe 32 PID 1228 wrote to memory of 2624 1228 Payment Confirmation Print Out Copy MT103.exe 34 PID 1228 wrote to memory of 2624 1228 Payment Confirmation Print Out Copy MT103.exe 34 PID 1228 wrote to memory of 2624 1228 Payment Confirmation Print Out Copy MT103.exe 34 PID 1228 wrote to memory of 2624 1228 Payment Confirmation Print Out Copy MT103.exe 34 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36 PID 1228 wrote to memory of 1556 1228 Payment Confirmation Print Out Copy MT103.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DarniQyyh.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DarniQyyh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7BF3.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5846a97f06525a2d07de40f08b169758c
SHA1b9c5e3fc47bb3ffe380b5e9b028a5eef77358d11
SHA2565e145e771edb408c6b9d632c189708acb2773dae263f9040529b37a87592c223
SHA512d511e4f78a81f5b1419bde46cb52d59fa05c1655c17a4a89b8b48e89b20337318aef2777d1cbe1f62f54ef18353844224f5a950580c04bc93a5873d9eafbe84b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5366afff3cd015a422465d424c878ce4c
SHA100d1a24f15f8de1808a31d4478ba9584001eb8c8
SHA256868871454c3d5e8bc6ca712cb3fa7ad311c72b20a943a946b3989190acd37821
SHA51216ed337a31cd37a1009b1f1cd9728d8e8230e344631c175e175fcdc9577903fe6cce76e71a7219b42ff359299d74da6f527cc54ef9e5744c11e52407ca9d610b