Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-01-2021 16:26

General

  • Target

    PALLS.exe

  • Size

    16KB

  • MD5

    f27fb91f116c7506a124cefb4d0cd0cc

  • SHA1

    ee7b6fc2072b885e349a02c135e5bea156153d42

  • SHA256

    8948b3f93b1fe502e9b838271ac7e46f15e5a79ea0706a7834cedcbd0c10b7d9

  • SHA512

    c2f3ce25fbd645db4b5945326f68b29b0d876aeca2edf95723de606de1e8e3dd0d0d5281fff3bb9d2763fc80c70daf1b6b13c4a87381afbf49d48ae7a1f33dc8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    mrst@mrst-kr.icu
  • Password:
    @Mexico1.,

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • AgentTesla Payload 4 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PALLS.exe
    "C:\Users\Admin\AppData\Local\Temp\PALLS.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Drops startup file
    • Windows security modification
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:724
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PALLS.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PALLS.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:940
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PALLS.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4068
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PALLS.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1980
    • C:\Users\Admin\AppData\Local\Temp\PALLS.exe
      "C:\Users\Admin\AppData\Local\Temp\PALLS.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4032
    • C:\Users\Admin\AppData\Local\Temp\PALLS.exe
      "C:\Users\Admin\AppData\Local\Temp\PALLS.exe"
      2⤵
        PID:2284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 96
          3⤵
          • Program crash
          PID:1300
      • C:\Users\Admin\AppData\Local\Temp\PALLS.exe
        "C:\Users\Admin\AppData\Local\Temp\PALLS.exe"
        2⤵
          PID:3004
        • C:\Users\Admin\AppData\Local\Temp\PALLS.exe
          "C:\Users\Admin\AppData\Local\Temp\PALLS.exe"
          2⤵
            PID:2260
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 88
              3⤵
              • Program crash
              PID:3936
          • C:\Users\Admin\AppData\Local\Temp\PALLS.exe
            "C:\Users\Admin\AppData\Local\Temp\PALLS.exe"
            2⤵
              PID:1844

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Winlogon Helper DLL

          1
          T1004

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          5
          T1112

          Disabling Security Tools

          3
          T1089

          Virtualization/Sandbox Evasion

          2
          T1497

          Credential Access

          Credentials in Files

          3
          T1081

          Discovery

          Query Registry

          4
          T1012

          Virtualization/Sandbox Evasion

          2
          T1497

          System Information Discovery

          3
          T1082

          Peripheral Device Discovery

          1
          T1120

          Collection

          Data from Local System

          3
          T1005

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
            MD5

            db01a2c1c7e70b2b038edf8ad5ad9826

            SHA1

            540217c647a73bad8d8a79e3a0f3998b5abd199b

            SHA256

            413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

            SHA512

            c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            MD5

            d7129c2e7b0891920239b83235d3481d

            SHA1

            d107366dc9da8133fea12a3ab3df819a20515583

            SHA256

            94d416d23f16c3fc91353745e00cf76ca4137cd1d63c5fc01a7ac81b5b3f7b9e

            SHA512

            296b85acf559e457bfc95a2a89a8814816cf2081ee3544945f9cd840201f3cfa37e448e406c466d253b20baad18d95517af0898c4951c56dc6c6c3eeab9b4186

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            MD5

            d7129c2e7b0891920239b83235d3481d

            SHA1

            d107366dc9da8133fea12a3ab3df819a20515583

            SHA256

            94d416d23f16c3fc91353745e00cf76ca4137cd1d63c5fc01a7ac81b5b3f7b9e

            SHA512

            296b85acf559e457bfc95a2a89a8814816cf2081ee3544945f9cd840201f3cfa37e448e406c466d253b20baad18d95517af0898c4951c56dc6c6c3eeab9b4186

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            MD5

            7ab56cd509a74e60ef6e04afbc6e60f3

            SHA1

            386f10cdc8ece4202763170d6788c54d346eb64d

            SHA256

            a8a3c0ab26099a122d0ee12e9f5bdc273df2dc7a8b010600d82ba59c9196ee14

            SHA512

            cb476eeb118687f893e80b820862a88cb46b8cf5dc308249cbaa682d85615bebc4732132565b3d65a41a9b9fea3386b92aeba1dbb2da15037aa7b20abd33943d

          • memory/724-50-0x0000000005F00000-0x0000000005F01000-memory.dmp
            Filesize

            4KB

          • memory/724-3-0x00000000004C0000-0x00000000004C1000-memory.dmp
            Filesize

            4KB

          • memory/724-5-0x0000000004D00000-0x0000000004D01000-memory.dmp
            Filesize

            4KB

          • memory/724-6-0x00000000052A0000-0x00000000052A1000-memory.dmp
            Filesize

            4KB

          • memory/724-7-0x0000000004F30000-0x0000000004F31000-memory.dmp
            Filesize

            4KB

          • memory/724-8-0x0000000005C20000-0x0000000005C84000-memory.dmp
            Filesize

            400KB

          • memory/724-9-0x0000000005D00000-0x0000000005D01000-memory.dmp
            Filesize

            4KB

          • memory/724-2-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/940-136-0x0000000004FB3000-0x0000000004FB4000-memory.dmp
            Filesize

            4KB

          • memory/940-72-0x0000000007B30000-0x0000000007B31000-memory.dmp
            Filesize

            4KB

          • memory/940-17-0x0000000004EC0000-0x0000000004EC1000-memory.dmp
            Filesize

            4KB

          • memory/940-21-0x0000000007B90000-0x0000000007B91000-memory.dmp
            Filesize

            4KB

          • memory/940-11-0x0000000000000000-mapping.dmp
          • memory/940-107-0x000000007F560000-0x000000007F561000-memory.dmp
            Filesize

            4KB

          • memory/940-75-0x0000000008AB0000-0x0000000008AB1000-memory.dmp
            Filesize

            4KB

          • memory/940-15-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/940-60-0x0000000008310000-0x0000000008311000-memory.dmp
            Filesize

            4KB

          • memory/940-34-0x0000000004FB0000-0x0000000004FB1000-memory.dmp
            Filesize

            4KB

          • memory/940-42-0x0000000004FB2000-0x0000000004FB3000-memory.dmp
            Filesize

            4KB

          • memory/940-52-0x0000000007920000-0x0000000007921000-memory.dmp
            Filesize

            4KB

          • memory/940-58-0x00000000079C0000-0x00000000079C1000-memory.dmp
            Filesize

            4KB

          • memory/1300-55-0x00000000043C0000-0x00000000043C1000-memory.dmp
            Filesize

            4KB

          • memory/1844-47-0x000000000043748E-mapping.dmp
          • memory/1980-124-0x0000000009710000-0x0000000009711000-memory.dmp
            Filesize

            4KB

          • memory/1980-80-0x00000000086B0000-0x00000000086B1000-memory.dmp
            Filesize

            4KB

          • memory/1980-13-0x0000000000000000-mapping.dmp
          • memory/1980-54-0x0000000006FE2000-0x0000000006FE3000-memory.dmp
            Filesize

            4KB

          • memory/1980-135-0x0000000006FE3000-0x0000000006FE4000-memory.dmp
            Filesize

            4KB

          • memory/1980-128-0x00000000098E0000-0x00000000098E1000-memory.dmp
            Filesize

            4KB

          • memory/1980-45-0x0000000006FE0000-0x0000000006FE1000-memory.dmp
            Filesize

            4KB

          • memory/1980-18-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/1980-119-0x00000000095A0000-0x00000000095A1000-memory.dmp
            Filesize

            4KB

          • memory/1980-103-0x000000007F8B0000-0x000000007F8B1000-memory.dmp
            Filesize

            4KB

          • memory/2260-41-0x000000000043748E-mapping.dmp
          • memory/2268-14-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/2268-10-0x0000000000000000-mapping.dmp
          • memory/2268-53-0x0000000004DE2000-0x0000000004DE3000-memory.dmp
            Filesize

            4KB

          • memory/2268-134-0x0000000004DE3000-0x0000000004DE4000-memory.dmp
            Filesize

            4KB

          • memory/2268-37-0x0000000004DE0000-0x0000000004DE1000-memory.dmp
            Filesize

            4KB

          • memory/2268-111-0x000000007E6A0000-0x000000007E6A1000-memory.dmp
            Filesize

            4KB

          • memory/2284-30-0x000000000043748E-mapping.dmp
          • memory/3004-36-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/3004-33-0x000000000043748E-mapping.dmp
          • memory/3936-56-0x0000000004C90000-0x0000000004C91000-memory.dmp
            Filesize

            4KB

          • memory/4032-132-0x0000000005AA0000-0x0000000005AA1000-memory.dmp
            Filesize

            4KB

          • memory/4032-29-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/4032-25-0x0000000000400000-0x000000000043C000-memory.dmp
            Filesize

            240KB

          • memory/4032-160-0x00000000056F1000-0x00000000056F2000-memory.dmp
            Filesize

            4KB

          • memory/4032-159-0x00000000015C0000-0x00000000015C1000-memory.dmp
            Filesize

            4KB

          • memory/4032-158-0x0000000006720000-0x0000000006721000-memory.dmp
            Filesize

            4KB

          • memory/4032-26-0x000000000043748E-mapping.dmp
          • memory/4032-49-0x00000000056F0000-0x00000000056F1000-memory.dmp
            Filesize

            4KB

          • memory/4068-51-0x0000000000AD2000-0x0000000000AD3000-memory.dmp
            Filesize

            4KB

          • memory/4068-146-0x0000000008D50000-0x0000000008D51000-memory.dmp
            Filesize

            4KB

          • memory/4068-16-0x0000000073DC0000-0x00000000744AE000-memory.dmp
            Filesize

            6.9MB

          • memory/4068-138-0x0000000009130000-0x0000000009131000-memory.dmp
            Filesize

            4KB

          • memory/4068-12-0x0000000000000000-mapping.dmp
          • memory/4068-137-0x0000000000AD3000-0x0000000000AD4000-memory.dmp
            Filesize

            4KB

          • memory/4068-40-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
            Filesize

            4KB

          • memory/4068-87-0x0000000008CF0000-0x0000000008D23000-memory.dmp
            Filesize

            204KB

          • memory/4068-99-0x000000007E410000-0x000000007E411000-memory.dmp
            Filesize

            4KB