Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe
Resource
win7-20240508-en
General
-
Target
9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe
-
Size
796KB
-
MD5
ffd403a9e8f8342fc37865b623a25c15
-
SHA1
1bd6ec07290ad0f7e78c81d118d3286c6b2def91
-
SHA256
9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4
-
SHA512
0ddaddc190ffbe76a867dbd6ede6449748894de7fee2be1c039624d96a8d938505375af5872dddf1b1f20f70bbdcec195a573d8d7b689d9fc88699fb956406f8
-
SSDEEP
24576:ipbzMtl7fAwDXHcmj12f1E6Hn8A4dEztQPm:iZAtVAwr8mEfq6H9KEeP
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exepowershell.exepid process 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 1408 powershell.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exepowershell.exedescription pid process Token: SeDebugPrivilege 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe Token: SeDebugPrivilege 1408 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exedescription pid process target process PID 2204 wrote to memory of 1408 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe powershell.exe PID 2204 wrote to memory of 1408 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe powershell.exe PID 2204 wrote to memory of 1408 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe powershell.exe PID 2204 wrote to memory of 1408 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe powershell.exe PID 2204 wrote to memory of 2668 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe schtasks.exe PID 2204 wrote to memory of 2668 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe schtasks.exe PID 2204 wrote to memory of 2668 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe schtasks.exe PID 2204 wrote to memory of 2668 2204 9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe"C:\Users\Admin\AppData\Local\Temp\9665879c5c26c6bce2c05c977f91dad5a19188059b4f380bec54a380f9f7c9c4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AQwekVaJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AQwekVaJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp451B.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp451B.tmpFilesize
1KB
MD5396bb34030afa89047cfbb9d7a68935c
SHA1a753ee23203bc9ff9e70b4f7d0a0ac2354751c32
SHA25688d9b5ae87a56201868eec9636f48b8ac56d4bbdb8e82adbbd0d6f1141d0aea9
SHA512eb33e2d3b605d9654abe02e9fff7b4a7d94b06ac0656b581992b85687c3d692693edad23c3223ffbaf61a9c3ecb03e36d77d80089e582af4f704cbbdd6de1352
-
memory/2204-0-0x0000000074B1E000-0x0000000074B1F000-memory.dmpFilesize
4KB
-
memory/2204-1-0x00000000002A0000-0x000000000036E000-memory.dmpFilesize
824KB
-
memory/2204-2-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB
-
memory/2204-3-0x00000000005D0000-0x00000000005E6000-memory.dmpFilesize
88KB
-
memory/2204-4-0x0000000000600000-0x0000000000616000-memory.dmpFilesize
88KB
-
memory/2204-5-0x0000000007760000-0x00000000077E4000-memory.dmpFilesize
528KB
-
memory/2204-11-0x00000000042D0000-0x0000000004312000-memory.dmpFilesize
264KB
-
memory/2204-14-0x0000000074B1E000-0x0000000074B1F000-memory.dmpFilesize
4KB
-
memory/2204-15-0x0000000074B10000-0x00000000751FE000-memory.dmpFilesize
6.9MB