Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    06-05-2021 22:02

General

  • Target

    inquiries for WCB .exe

  • Size

    990KB

  • MD5

    931935b4df4ffdbdf7fe06ddd0ec7cd1

  • SHA1

    f41f4148962f5d0a6181c0cdf51e1d7c5b6ede8b

  • SHA256

    5a5953c3eb2a3f323e0eeb4b30092026004a2408eadedd96818e505d26f7f846

  • SHA512

    dc0e1bccf64bb8b4ff39fc1443d9f9c3c7ac90e4ac7b91bf58c75a28b3ca1736a238cd2d08f0eaed2212e21726fb438bd4fb977af29b278cb99b19831ab3487e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    cjnew@cjserverlogs2021luck.xyz
  • Password:
    cjcurrent@5000

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 3 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\inquiries for WCB .exe
    "C:\Users\Admin\AppData\Local\Temp\inquiries for WCB .exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\inquiries for WCB .exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2668
    • C:\Users\Admin\AppData\Local\Temp\inquiries for WCB .exe
      "C:\Users\Admin\AppData\Local\Temp\inquiries for WCB .exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:368

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-131-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/368-141-0x0000000004960000-0x0000000004E5E000-memory.dmp
    Filesize

    5.0MB

  • memory/368-132-0x00000000004374CE-mapping.dmp
  • memory/2668-142-0x0000000007900000-0x0000000007901000-memory.dmp
    Filesize

    4KB

  • memory/2668-133-0x0000000006ED0000-0x0000000006ED1000-memory.dmp
    Filesize

    4KB

  • memory/2668-185-0x00000000045A3000-0x00000000045A4000-memory.dmp
    Filesize

    4KB

  • memory/2668-184-0x000000007E5F0000-0x000000007E5F1000-memory.dmp
    Filesize

    4KB

  • memory/2668-167-0x0000000009230000-0x0000000009231000-memory.dmp
    Filesize

    4KB

  • memory/2668-166-0x0000000008E70000-0x0000000008E71000-memory.dmp
    Filesize

    4KB

  • memory/2668-161-0x0000000008D10000-0x0000000008D11000-memory.dmp
    Filesize

    4KB

  • memory/2668-125-0x0000000000000000-mapping.dmp
  • memory/2668-154-0x0000000008D30000-0x0000000008D63000-memory.dmp
    Filesize

    204KB

  • memory/2668-129-0x0000000004470000-0x0000000004471000-memory.dmp
    Filesize

    4KB

  • memory/2668-130-0x0000000006FB0000-0x0000000006FB1000-memory.dmp
    Filesize

    4KB

  • memory/2668-146-0x0000000007F50000-0x0000000007F51000-memory.dmp
    Filesize

    4KB

  • memory/2668-145-0x0000000008180000-0x0000000008181000-memory.dmp
    Filesize

    4KB

  • memory/2668-144-0x0000000007690000-0x0000000007691000-memory.dmp
    Filesize

    4KB

  • memory/2668-137-0x00000000077C0000-0x00000000077C1000-memory.dmp
    Filesize

    4KB

  • memory/2668-136-0x00000000045A0000-0x00000000045A1000-memory.dmp
    Filesize

    4KB

  • memory/2668-139-0x00000000045A2000-0x00000000045A3000-memory.dmp
    Filesize

    4KB

  • memory/3896-116-0x0000000005170000-0x0000000005171000-memory.dmp
    Filesize

    4KB

  • memory/3896-114-0x0000000000860000-0x0000000000861000-memory.dmp
    Filesize

    4KB

  • memory/3896-119-0x0000000005220000-0x0000000005221000-memory.dmp
    Filesize

    4KB

  • memory/3896-117-0x0000000005710000-0x0000000005711000-memory.dmp
    Filesize

    4KB

  • memory/3896-118-0x00000000052B0000-0x00000000052B1000-memory.dmp
    Filesize

    4KB

  • memory/3896-126-0x000000000BFB0000-0x000000000BFB1000-memory.dmp
    Filesize

    4KB

  • memory/3896-124-0x0000000005D90000-0x0000000005DCE000-memory.dmp
    Filesize

    248KB

  • memory/3896-123-0x00000000010E0000-0x000000000115C000-memory.dmp
    Filesize

    496KB

  • memory/3896-122-0x0000000005460000-0x000000000546D000-memory.dmp
    Filesize

    52KB

  • memory/3896-121-0x0000000005210000-0x000000000570E000-memory.dmp
    Filesize

    5.0MB

  • memory/3896-120-0x0000000005480000-0x0000000005481000-memory.dmp
    Filesize

    4KB