Analysis

  • max time kernel
    103s
  • max time network
    111s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-04-2021 08:08

General

  • Target

    b9a31ec9cf6084d9ea4543ae5454f6c0.exe

  • Size

    35KB

  • MD5

    b9a31ec9cf6084d9ea4543ae5454f6c0

  • SHA1

    1b8fe311794d5ee7c85930d57e8ee521653342e0

  • SHA256

    9bdd28e639ad1bd0bd8cab6e287279db86d951b1a488786c3435f7a5f39ac383

  • SHA512

    91e0e5ee915b8217a84a85c860f0be6f145cac6188b0de7874d698952b7a1f7fb16cde22cb59a1a2fef5af131f81408ae28161c7ed900f1d75885f9bdb1c138f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    binatonezx.cf
  • Port:
    587
  • Username:
    arinzelogs@binatonezx.cf
  • Password:
    7213575aceACE@#$

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • UAC bypass 3 TTPs
  • Windows security bypass 2 TTPs
  • AgentTesla Payload 3 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe
    "C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe"
    1⤵
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:496
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2228
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3456
      • C:\Windows\SysWOW64\timeout.exe
        timeout 1
        3⤵
        • Delays execution with timeout.exe
        PID:3248
    • C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe
      "C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe"
      2⤵
        PID:584
      • C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe
        "C:\Users\Admin\AppData\Local\Temp\b9a31ec9cf6084d9ea4543ae5454f6c0.exe"
        2⤵
        • Drops file in Drivers directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:372

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Privilege Escalation

    Bypass User Account Control

    1
    T1088

    Defense Evasion

    Bypass User Account Control

    1
    T1088

    Disabling Security Tools

    3
    T1089

    Modify Registry

    5
    T1112

    Install Root Certificate

    1
    T1130

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    3
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/372-129-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/372-188-0x00000000050D0000-0x00000000055CE000-memory.dmp
      Filesize

      5.0MB

    • memory/372-142-0x00000000050D0000-0x00000000055CE000-memory.dmp
      Filesize

      5.0MB

    • memory/372-130-0x000000000043765E-mapping.dmp
    • memory/496-116-0x00000000029B0000-0x00000000029B1000-memory.dmp
      Filesize

      4KB

    • memory/496-117-0x0000000006E00000-0x0000000006E01000-memory.dmp
      Filesize

      4KB

    • memory/496-118-0x0000000006C00000-0x0000000006CAD000-memory.dmp
      Filesize

      692KB

    • memory/496-119-0x0000000008AE0000-0x0000000008AE1000-memory.dmp
      Filesize

      4KB

    • memory/496-120-0x0000000006F40000-0x0000000006F41000-memory.dmp
      Filesize

      4KB

    • memory/496-114-0x00000000004D0000-0x00000000004D1000-memory.dmp
      Filesize

      4KB

    • memory/2228-132-0x0000000006C70000-0x0000000006C71000-memory.dmp
      Filesize

      4KB

    • memory/2228-140-0x0000000007BD0000-0x0000000007BD1000-memory.dmp
      Filesize

      4KB

    • memory/2228-121-0x0000000000000000-mapping.dmp
    • memory/2228-126-0x00000000072B0000-0x00000000072B1000-memory.dmp
      Filesize

      4KB

    • memory/2228-125-0x0000000006B70000-0x0000000006B71000-memory.dmp
      Filesize

      4KB

    • memory/2228-133-0x0000000007B60000-0x0000000007B61000-memory.dmp
      Filesize

      4KB

    • memory/2228-135-0x0000000006C72000-0x0000000006C73000-memory.dmp
      Filesize

      4KB

    • memory/2228-137-0x0000000007980000-0x0000000007981000-memory.dmp
      Filesize

      4KB

    • memory/2228-138-0x0000000007C70000-0x0000000007C71000-memory.dmp
      Filesize

      4KB

    • memory/2228-128-0x00000000078E0000-0x00000000078E1000-memory.dmp
      Filesize

      4KB

    • memory/2228-141-0x00000000083F0000-0x00000000083F1000-memory.dmp
      Filesize

      4KB

    • memory/2228-166-0x0000000006C73000-0x0000000006C74000-memory.dmp
      Filesize

      4KB

    • memory/2228-143-0x0000000008320000-0x0000000008321000-memory.dmp
      Filesize

      4KB

    • memory/2228-151-0x00000000090D0000-0x0000000009103000-memory.dmp
      Filesize

      204KB

    • memory/2228-158-0x00000000090B0000-0x00000000090B1000-memory.dmp
      Filesize

      4KB

    • memory/2228-163-0x0000000009130000-0x0000000009131000-memory.dmp
      Filesize

      4KB

    • memory/2228-164-0x00000000095F0000-0x00000000095F1000-memory.dmp
      Filesize

      4KB

    • memory/2228-165-0x000000007F760000-0x000000007F761000-memory.dmp
      Filesize

      4KB

    • memory/3248-127-0x0000000000000000-mapping.dmp
    • memory/3456-124-0x0000000000000000-mapping.dmp