Analysis

  • max time kernel
    102s
  • max time network
    107s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-01-2021 14:35

General

  • Target

    RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe

  • Size

    2.2MB

  • MD5

    5ff5bbb9fd1f1d3a586ad9bea10a9773

  • SHA1

    1426737ae0a2039a85e9683aad4e1fc6b2d5a27b

  • SHA256

    a12c65ad23f195521f525ed905373f22fe0853c1e1fcfb317056d81051e6e532

  • SHA512

    aa21b5424ff194d35552e25a64a96d29c50229bc2281964a62c82069f38e956592d4099e99e682c859d9ab36165c80bf63b26dac11e9c7d1ca1ec63c84a547fe

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.newviking.com.my
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    {&SgX:^(7m

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • AgentTesla Payload 2 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Drops startup file
      • Windows security modification
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4352
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:508
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:856
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4080
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:4548
      • C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        PID:4620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 2332
        3⤵
        • Program crash
        PID:212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ for the supply of materialsservices for P.O. No. - 4700001838.exe.log
    MD5

    4d710ca9c563bbb76bb29b87d5d64282

    SHA1

    2b1271f68a5d18e1c1bb08800a9cc9464e8a81ad

    SHA256

    6c7ac5cff014a13315b8813524bbd14471f1ab7aac691be94d4d4f28e4cd2de4

    SHA512

    873c9ee04e4f8d23f8cf90ffea89a362e8eda43c0cfc6bb47442f93e0add8794c004081350cfbd7cfaed6d101582287b26a00951d4019dfb466f21514e5d90d6

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    MD5

    1c19c16e21c97ed42d5beabc93391fc5

    SHA1

    8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

    SHA256

    1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

    SHA512

    7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    97a7ef630686f0aa0b27bf7ce355ba75

    SHA1

    2dbe466244cef00831dbc17b05c4e2c6160c9e67

    SHA256

    24c9cddc2b959691e19b72cb1e03b74c2931c2323f493b6d4c236867a8960a19

    SHA512

    7f2bf0d4b26a2b592a62e5fd18748498b828b64086bf35be0d600f19ac744e9c595d270bbf8a892fd3be71a06ea86889e805d9db876f16156c3d718179c10d9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    5df252c52b3ee9298dc4fb3a3d74b30b

    SHA1

    2e4bb12b266612e12449d1136933ebdfdc1f3d5f

    SHA256

    eb606362694eee9d3c7f006bfbb33be4657293cf988bba541a13ad4f24ba8c87

    SHA512

    b2dd0eb87a322f9af5b54ac9368c77ac2512de2744d12b2836e3277fce1a60f687c120934c744c8e32c17052e7acba7ca2bb72df1fb7c8a9385a80d9ed013f87

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    ae93db7d91c28fecedd04baf419f801e

    SHA1

    df86c2dd27715839c1a2d4772588198056ae007e

    SHA256

    38327a7ea851149bdadeb46ce5fbf6e98726f9e8247030c6e76a3eb2249ecbd4

    SHA512

    7138904e941dd0024539e287c38d98f4cf437c4393508d64c37886b5604f2709f2ea37b5772a2f7a61afed1be1f3f05d540ed05395f1aa043e96c43be513b341

  • memory/212-82-0x0000000004EE0000-0x0000000004EE1000-memory.dmp
    Filesize

    4KB

  • memory/508-112-0x000000007FD20000-0x000000007FD21000-memory.dmp
    Filesize

    4KB

  • memory/508-39-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB

  • memory/508-63-0x0000000007D60000-0x0000000007D61000-memory.dmp
    Filesize

    4KB

  • memory/508-40-0x0000000004A12000-0x0000000004A13000-memory.dmp
    Filesize

    4KB

  • memory/508-28-0x0000000007650000-0x0000000007651000-memory.dmp
    Filesize

    4KB

  • memory/508-47-0x00000000075B0000-0x00000000075B1000-memory.dmp
    Filesize

    4KB

  • memory/508-25-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/508-134-0x0000000004A13000-0x0000000004A14000-memory.dmp
    Filesize

    4KB

  • memory/508-21-0x0000000000000000-mapping.dmp
  • memory/508-50-0x0000000007E00000-0x0000000007E01000-memory.dmp
    Filesize

    4KB

  • memory/856-133-0x00000000042F3000-0x00000000042F4000-memory.dmp
    Filesize

    4KB

  • memory/856-22-0x0000000000000000-mapping.dmp
  • memory/856-86-0x0000000008AD0000-0x0000000008B03000-memory.dmp
    Filesize

    204KB

  • memory/856-108-0x000000007EA40000-0x000000007EA41000-memory.dmp
    Filesize

    4KB

  • memory/856-113-0x0000000008AB0000-0x0000000008AB1000-memory.dmp
    Filesize

    4KB

  • memory/856-30-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/856-43-0x00000000042F2000-0x00000000042F3000-memory.dmp
    Filesize

    4KB

  • memory/856-42-0x00000000042F0000-0x00000000042F1000-memory.dmp
    Filesize

    4KB

  • memory/856-117-0x0000000008E30000-0x0000000008E31000-memory.dmp
    Filesize

    4KB

  • memory/1076-23-0x0000000000000000-mapping.dmp
  • memory/1076-66-0x00000000081F0000-0x00000000081F1000-memory.dmp
    Filesize

    4KB

  • memory/1076-142-0x0000000009730000-0x0000000009731000-memory.dmp
    Filesize

    4KB

  • memory/1076-136-0x0000000009750000-0x0000000009751000-memory.dmp
    Filesize

    4KB

  • memory/1076-103-0x000000007E850000-0x000000007E851000-memory.dmp
    Filesize

    4KB

  • memory/1076-32-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/1076-44-0x0000000006DD0000-0x0000000006DD1000-memory.dmp
    Filesize

    4KB

  • memory/1076-135-0x0000000006DD3000-0x0000000006DD4000-memory.dmp
    Filesize

    4KB

  • memory/1076-38-0x0000000006DD2000-0x0000000006DD3000-memory.dmp
    Filesize

    4KB

  • memory/1076-71-0x0000000008510000-0x0000000008511000-memory.dmp
    Filesize

    4KB

  • memory/3808-35-0x0000000005BE0000-0x0000000005BE1000-memory.dmp
    Filesize

    4KB

  • memory/3808-11-0x000000001005266E-mapping.dmp
  • memory/3808-13-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/3808-10-0x0000000010000000-0x0000000010058000-memory.dmp
    Filesize

    352KB

  • memory/3808-18-0x0000000005020000-0x0000000005021000-memory.dmp
    Filesize

    4KB

  • memory/4080-54-0x0000000000000000-mapping.dmp
  • memory/4352-132-0x0000000007143000-0x0000000007144000-memory.dmp
    Filesize

    4KB

  • memory/4352-128-0x00000000099C0000-0x00000000099C1000-memory.dmp
    Filesize

    4KB

  • memory/4352-20-0x0000000000000000-mapping.dmp
  • memory/4352-36-0x0000000007140000-0x0000000007141000-memory.dmp
    Filesize

    4KB

  • memory/4352-41-0x0000000007142000-0x0000000007143000-memory.dmp
    Filesize

    4KB

  • memory/4352-45-0x0000000007640000-0x0000000007641000-memory.dmp
    Filesize

    4KB

  • memory/4352-98-0x000000007F3F0000-0x000000007F3F1000-memory.dmp
    Filesize

    4KB

  • memory/4352-26-0x0000000004C10000-0x0000000004C11000-memory.dmp
    Filesize

    4KB

  • memory/4352-24-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/4548-62-0x0000000000000000-mapping.dmp
  • memory/4620-76-0x000000000043763E-mapping.dmp
  • memory/4620-94-0x0000000005610000-0x0000000005611000-memory.dmp
    Filesize

    4KB

  • memory/4620-75-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/4620-160-0x0000000005611000-0x0000000005612000-memory.dmp
    Filesize

    4KB

  • memory/4620-156-0x0000000005620000-0x0000000005621000-memory.dmp
    Filesize

    4KB

  • memory/4620-77-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/4768-19-0x0000000004D40000-0x0000000004D41000-memory.dmp
    Filesize

    4KB

  • memory/4768-2-0x00000000732D0000-0x00000000739BE000-memory.dmp
    Filesize

    6.9MB

  • memory/4768-7-0x0000000005520000-0x0000000005521000-memory.dmp
    Filesize

    4KB

  • memory/4768-6-0x0000000005340000-0x0000000005341000-memory.dmp
    Filesize

    4KB

  • memory/4768-5-0x0000000005760000-0x0000000005761000-memory.dmp
    Filesize

    4KB

  • memory/4768-3-0x00000000007A0000-0x00000000007A1000-memory.dmp
    Filesize

    4KB

  • memory/4768-8-0x0000000005510000-0x0000000005511000-memory.dmp
    Filesize

    4KB

  • memory/4768-9-0x0000000005320000-0x0000000005321000-memory.dmp
    Filesize

    4KB