Analysis

  • max time kernel
    139s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    30-06-2020 12:09

General

  • Target

    11203780.msi

  • Size

    444KB

  • MD5

    7d7c9f126169d3ad991f2b511b466e47

  • SHA1

    7795bbdef40832cee08256ebe1cca0c6df8bc740

  • SHA256

    75c0601db308796a7e8b5f045f908dd910a4a869cc53d544ed28726ad0eb0537

  • SHA512

    cf6e5d6dad7e345b435b91736dae86d6d66ebf726925fc7d843a6c6f773e2a20a10b50ce4533ddf154f48fbc4771f4ee693fb54b0c7106017e40d3649dd95f04

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    pagejeffrey@yandex.com
  • Password:
    $44#@weC0*

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\11203780.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1400
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Windows\Installer\MSIF603.tmp
      "C:\Windows\Installer\MSIF603.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzxxmSogFmAhK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp927E.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1460
      • C:\Windows\Installer\MSIF603.tmp
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1064
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:240
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "00000000000005A8" "0000000000000584"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:688

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp927E.tmp
    MD5

    b3f0284daaab917a86328b3339b8b463

    SHA1

    a0593855a2eb96b0378c77e66e9ba345837f67fa

    SHA256

    8fd32cc48b0336567a0469b4f2ba7e136ef78b59c322e15eace1004ea34cbabb

    SHA512

    a740035edf3aea2b52f2b1577e548a0fe7ff1bbc651166967b7eff3ce9d1f728cb92a168ae65787a6e40daaa5a4917e09cc5f7cd0f9dd8da3a7e9952171732e2

  • C:\Windows\Installer\MSIF603.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • C:\Windows\Installer\MSIF603.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • C:\Windows\Installer\MSIF603.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • memory/1064-19-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1064-18-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1064-16-0x0000000000446ADE-mapping.dmp
  • memory/1064-15-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1400-1-0x00000000040E0000-0x00000000040E4000-memory.dmp
    Filesize

    16KB

  • memory/1400-24-0x00000000021D0000-0x00000000021D4000-memory.dmp
    Filesize

    16KB

  • memory/1400-0-0x00000000032D0000-0x00000000032D4000-memory.dmp
    Filesize

    16KB

  • memory/1460-13-0x0000000000000000-mapping.dmp
  • memory/1548-6-0x00000000012D0000-0x00000000012D4000-memory.dmp
    Filesize

    16KB

  • memory/1548-5-0x00000000012D0000-0x00000000012D4000-memory.dmp
    Filesize

    16KB

  • memory/1548-4-0x00000000017C0000-0x00000000017C4000-memory.dmp
    Filesize

    16KB

  • memory/1548-20-0x0000000004630000-0x0000000004634000-memory.dmp
    Filesize

    16KB

  • memory/1548-22-0x00000000012D0000-0x00000000012D4000-memory.dmp
    Filesize

    16KB

  • memory/1548-23-0x0000000004630000-0x0000000004634000-memory.dmp
    Filesize

    16KB

  • memory/1548-3-0x0000000000B60000-0x0000000000B62000-memory.dmp
    Filesize

    8KB

  • memory/1572-12-0x0000000000000000-0x0000000000000000-disk.dmp
  • memory/1572-8-0x0000000000000000-mapping.dmp