Analysis

  • max time kernel
    90s
  • max time network
    111s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-01-2021 00:12

General

  • Target

    MT103.exe

  • Size

    1.6MB

  • MD5

    98c9171973d6219056145324920d60a6

  • SHA1

    3eca2077db8cf92becfb5b531db2ba6fedae7105

  • SHA256

    6e7d48f627ce65c08d2bf88286a4597a069d6b7c086185d7ef6e1578e6290f9c

  • SHA512

    084c6247e756e3d3648fef1170254e82164382b952eba472779675f980bcd7b08102a1125f37020da6c598d7d3eda554924948094b38ae9f4ff22613b4f3b150

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gammavilla.org
  • Port:
    587
  • Username:
    info@gammavilla.org
  • Password:
    county2018

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gammavilla.org
  • Port:
    587
  • Username:
    info@gammavilla.org
  • Password:
    county2018

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MT103.exe
    "C:\Users\Admin\AppData\Local\Temp\MT103.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Users\Admin\AppData\Local\Temp\MT103.exe
      "{path}"
      2⤵
        PID:3860
      • C:\Users\Admin\AppData\Local\Temp\MT103.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2916

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MT103.exe.log
      MD5

      b4f7a6a57cb46d94b72410eb6a6d45a9

      SHA1

      69f3596ffa027202d391444b769ceea0ae14c5f7

      SHA256

      23994ebe221a48ea16ebad51ae0d4b47ccd415ae10581f9405e588d4f6c2523b

      SHA512

      be6da516e54c3a5b33ac2603137a2f8cf8445ff5961dd266faedf3627bae8979953d7ef305538df0151c609917a5b99bf5d023bdd32de50fd5c723950f90db5c

    • memory/2916-13-0x0000000000400000-0x0000000000464000-memory.dmp
      Filesize

      400KB

    • memory/2916-23-0x0000000006510000-0x0000000006511000-memory.dmp
      Filesize

      4KB

    • memory/2916-22-0x0000000005940000-0x0000000005941000-memory.dmp
      Filesize

      4KB

    • memory/2916-21-0x00000000057F0000-0x00000000057F1000-memory.dmp
      Filesize

      4KB

    • memory/2916-16-0x0000000073CE0000-0x00000000743CE000-memory.dmp
      Filesize

      6.9MB

    • memory/2916-14-0x000000000045FE6E-mapping.dmp
    • memory/4704-7-0x0000000005140000-0x0000000005141000-memory.dmp
      Filesize

      4KB

    • memory/4704-11-0x0000000007390000-0x000000000741C000-memory.dmp
      Filesize

      560KB

    • memory/4704-12-0x00000000074D0000-0x00000000074D1000-memory.dmp
      Filesize

      4KB

    • memory/4704-10-0x0000000005590000-0x000000000559E000-memory.dmp
      Filesize

      56KB

    • memory/4704-9-0x0000000005110000-0x0000000005111000-memory.dmp
      Filesize

      4KB

    • memory/4704-8-0x0000000004E90000-0x0000000004E91000-memory.dmp
      Filesize

      4KB

    • memory/4704-2-0x0000000073CE0000-0x00000000743CE000-memory.dmp
      Filesize

      6.9MB

    • memory/4704-6-0x00000000055A0000-0x00000000055A1000-memory.dmp
      Filesize

      4KB

    • memory/4704-5-0x0000000004DD0000-0x0000000004E7D000-memory.dmp
      Filesize

      692KB

    • memory/4704-3-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB