Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe
Resource
win7-20240508-en
General
-
Target
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe
-
Size
802KB
-
MD5
41413fc60a8ab3de8dd4c588cf655ac8
-
SHA1
3a712fbb23cacb731e225f5cc07ee3c669e16e6b
-
SHA256
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c
-
SHA512
cc23d86565ffa4101770bddcccea607546b911cae16651869d18a94ddf9e859fe1af58c1844dd3dba8013471ae7334755bfe7a6f07d99cb78985047c8de690d5
-
SSDEEP
12288:jdjofC1PqbsDovxW4y2a40hAmT8Ed8wWeBXtgJJg2NdduvEspw:D1qYD143aHhmEd8wpBXtgg2n0ca
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
UTjMgxC7qqqqG5651@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exedescription pid process target process PID 1928 set thread context of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exeMSBuild.exepowershell.exepid process 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe 2604 MSBuild.exe 2604 MSBuild.exe 1040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exeMSBuild.exepowershell.exedescription pid process Token: SeDebugPrivilege 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe Token: SeDebugPrivilege 2604 MSBuild.exe Token: SeDebugPrivilege 1040 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exedescription pid process target process PID 1928 wrote to memory of 1040 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe powershell.exe PID 1928 wrote to memory of 1040 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe powershell.exe PID 1928 wrote to memory of 1040 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe powershell.exe PID 1928 wrote to memory of 1040 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe powershell.exe PID 1928 wrote to memory of 2676 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe schtasks.exe PID 1928 wrote to memory of 2676 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe schtasks.exe PID 1928 wrote to memory of 2676 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe schtasks.exe PID 1928 wrote to memory of 2676 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe schtasks.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe PID 1928 wrote to memory of 2604 1928 bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe"C:\Users\Admin\AppData\Local\Temp\bfdeb36839c4bea7f10ff81531bf3bc7994d13ac97060f72154c61e5e3dbbd8c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rijwHXlSipb.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rijwHXlSipb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4460.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4460.tmpFilesize
1KB
MD5b0dc62ebbb0eb17c4e7333803e225c4e
SHA1d5ef26cb40fe32cc5832de1d551246cdb17eb0f1
SHA256d322711accfaec657cb3665e9ac4d67703f8ee36ef5fafde2730968d266cddcc
SHA51211bd3b8de49aaf4cf4e5597f6e1f8e1a1e2928788005c426914396ad4e1297db25f7ac374e3acfa1e253aa43aa7657a8e56ef8a4b455d78af12c70c7ad89a29e
-
memory/1928-26-0x0000000074D30000-0x000000007541E000-memory.dmpFilesize
6.9MB
-
memory/1928-1-0x0000000000250000-0x000000000031E000-memory.dmpFilesize
824KB
-
memory/1928-2-0x0000000074D30000-0x000000007541E000-memory.dmpFilesize
6.9MB
-
memory/1928-4-0x00000000003E0000-0x00000000003E8000-memory.dmpFilesize
32KB
-
memory/1928-3-0x00000000004F0000-0x000000000050A000-memory.dmpFilesize
104KB
-
memory/1928-5-0x0000000000460000-0x000000000046C000-memory.dmpFilesize
48KB
-
memory/1928-6-0x000000000D190000-0x000000000D212000-memory.dmpFilesize
520KB
-
memory/1928-0-0x0000000074D3E000-0x0000000074D3F000-memory.dmpFilesize
4KB
-
memory/2604-18-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2604-25-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2604-24-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2604-23-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2604-22-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2604-16-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2604-21-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2604-14-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB