Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation Print Out Copy MT103.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Payment Confirmation Print Out Copy MT103.exe
Resource
win10v2004-20250314-en
General
-
Target
Payment Confirmation Print Out Copy MT103.exe
-
Size
703KB
-
MD5
e5cd98a64f8e5107f0f9ce6b90613333
-
SHA1
1f1677af3f494b8def43775a9077357b756184d7
-
SHA256
aedfae05284600f51e6fe18a6f47ac68c7971e365d827bed7bc2205f27063c8d
-
SHA512
e948219debb7790b4ffe26cb9cecd155d2aec1a03a6fd368b49335c25ee24a6805bb3be466dfa099e193630aaec89270368a5294f386c8922e70d616498de024
-
SSDEEP
12288:yMQiKaxTR1Q8QTAI8vRPc6dWy2HF5VmChmFZKt5HQveM4uHzZNKf5zBnym+FNb/:BQib1qkIGRPc6kvVmTFwt9Qp3KBNym+D
Malware Config
Extracted
Protocol: ftp- Host:
ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.haliza.com.my - Port:
21 - Username:
[email protected] - Password:
JesusChrist007$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2996 powershell.exe 3492 powershell.exe 3172 powershell.exe 1600 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation sgxIb.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation Payment Confirmation Print Out Copy MT103.exe -
Executes dropped EXE 2 IoCs
pid Process 1444 sgxIb.exe 4408 sgxIb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sgxIb = "C:\\Users\\Admin\\AppData\\Roaming\\sgxIb\\sgxIb.exe" Payment Confirmation Print Out Copy MT103.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 api.ipify.org 32 api.ipify.org 67 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1732 set thread context of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1444 set thread context of 4408 1444 sgxIb.exe 118 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgxIb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgxIb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Confirmation Print Out Copy MT103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Confirmation Print Out Copy MT103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1944 schtasks.exe 3272 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1732 Payment Confirmation Print Out Copy MT103.exe 2996 powershell.exe 2996 powershell.exe 3492 powershell.exe 3492 powershell.exe 1732 Payment Confirmation Print Out Copy MT103.exe 1732 Payment Confirmation Print Out Copy MT103.exe 952 Payment Confirmation Print Out Copy MT103.exe 952 Payment Confirmation Print Out Copy MT103.exe 952 Payment Confirmation Print Out Copy MT103.exe 2996 powershell.exe 3492 powershell.exe 1444 sgxIb.exe 1444 sgxIb.exe 1600 powershell.exe 1600 powershell.exe 3172 powershell.exe 3172 powershell.exe 1444 sgxIb.exe 3172 powershell.exe 4408 sgxIb.exe 4408 sgxIb.exe 4408 sgxIb.exe 1600 powershell.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4408 sgxIb.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1732 Payment Confirmation Print Out Copy MT103.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeDebugPrivilege 3492 powershell.exe Token: SeDebugPrivilege 952 Payment Confirmation Print Out Copy MT103.exe Token: SeDebugPrivilege 1444 sgxIb.exe Token: SeDebugPrivilege 3172 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 4408 sgxIb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 952 Payment Confirmation Print Out Copy MT103.exe 4408 sgxIb.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2996 1732 Payment Confirmation Print Out Copy MT103.exe 97 PID 1732 wrote to memory of 2996 1732 Payment Confirmation Print Out Copy MT103.exe 97 PID 1732 wrote to memory of 2996 1732 Payment Confirmation Print Out Copy MT103.exe 97 PID 1732 wrote to memory of 3492 1732 Payment Confirmation Print Out Copy MT103.exe 99 PID 1732 wrote to memory of 3492 1732 Payment Confirmation Print Out Copy MT103.exe 99 PID 1732 wrote to memory of 3492 1732 Payment Confirmation Print Out Copy MT103.exe 99 PID 1732 wrote to memory of 1944 1732 Payment Confirmation Print Out Copy MT103.exe 100 PID 1732 wrote to memory of 1944 1732 Payment Confirmation Print Out Copy MT103.exe 100 PID 1732 wrote to memory of 1944 1732 Payment Confirmation Print Out Copy MT103.exe 100 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 1732 wrote to memory of 952 1732 Payment Confirmation Print Out Copy MT103.exe 103 PID 3064 wrote to memory of 1444 3064 cmd.exe 106 PID 3064 wrote to memory of 1444 3064 cmd.exe 106 PID 3064 wrote to memory of 1444 3064 cmd.exe 106 PID 1444 wrote to memory of 3172 1444 sgxIb.exe 112 PID 1444 wrote to memory of 3172 1444 sgxIb.exe 112 PID 1444 wrote to memory of 3172 1444 sgxIb.exe 112 PID 1444 wrote to memory of 1600 1444 sgxIb.exe 114 PID 1444 wrote to memory of 1600 1444 sgxIb.exe 114 PID 1444 wrote to memory of 1600 1444 sgxIb.exe 114 PID 1444 wrote to memory of 3272 1444 sgxIb.exe 116 PID 1444 wrote to memory of 3272 1444 sgxIb.exe 116 PID 1444 wrote to memory of 3272 1444 sgxIb.exe 116 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118 PID 1444 wrote to memory of 4408 1444 sgxIb.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DarniQyyh.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DarniQyyh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB391.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation Print Out Copy MT103.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\sgxIb\sgxIb.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\sgxIb\sgxIb.exeC:\Users\Admin\AppData\Roaming\sgxIb\sgxIb.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sgxIb\sgxIb.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DarniQyyh.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DarniQyyh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp21E.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3272
-
-
C:\Users\Admin\AppData\Roaming\sgxIb\sgxIb.exe"C:\Users\Admin\AppData\Roaming\sgxIb\sgxIb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5c3f58387ce66648d5114b1dc15ba5b5e
SHA1b400951ce975b7c7d6c17ac7417b564170ca85a9
SHA256a4aa4de4a2f09065165417fa2d06a5c76519cb4d8db69484967ed5e20598f827
SHA512d48cd60374ef3310965f11a98a70dc10c0843cda2bad06a1441ea53a7e6288eb42cb8846bc98cb7c424f813fa099396b7d2b5b0a950a26894e2b6b73606a2e7c
-
Filesize
18KB
MD5341853793542f55f129e7ac063fcf202
SHA180f2542671a7cd1ea871e0d98797dc313d7817ac
SHA2562399b8fe538efd93cca63d27c1ae10d3f076e5e0aa13a243cb42f91b79aa87b7
SHA5121171d24ae32d20b93b47e93d8836a75bdcb8afc3311f73bdf88a2327deee031599ad1427ef17f0eb448fcb386e45b05268e0ff9e0756d6c6fc4c2e4a81a2e37a
-
Filesize
136B
MD56734c0ffdc36db6162c0c8c383cd0400
SHA159b23b8e71d024d190707217315ba235f4138429
SHA2568473c2316807e44ac2f83b5c52982ff2d3dd1cb2b95cd598624e25ace6e65c6c
SHA512690323a80f15c890e2d7cc682261c01925797bf4128a5c2e179397ea15b0fbc2d38bad493c3ee389fe606e25549c6bdc1bc41bfe349454f2cc790d4240c884a5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5178e154d3888458955cfef771e5b01bf
SHA177aa9058b735e8b29c8c8a5afb7a243ec79ad9ba
SHA2562524161d81f84b7ea01b5e34691fead56de43ce0ae940006bb8878b901f8973e
SHA512d1f5fb2d8b9b9a7602831fe0d429ea18ce8ad14a2234b1e1f5fa5321739cad1bd5f082cd29869fa57e6c4eb98b371ff350f5370c5386858082b153018176feda
-
Filesize
703KB
MD5e5cd98a64f8e5107f0f9ce6b90613333
SHA11f1677af3f494b8def43775a9077357b756184d7
SHA256aedfae05284600f51e6fe18a6f47ac68c7971e365d827bed7bc2205f27063c8d
SHA512e948219debb7790b4ffe26cb9cecd155d2aec1a03a6fd368b49335c25ee24a6805bb3be466dfa099e193630aaec89270368a5294f386c8922e70d616498de024