Analysis

  • max time kernel
    115s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    24-06-2021 12:05

General

  • Target

    Scan docs.exe

  • Size

    926KB

  • MD5

    94159f5873c12cd7ee9b2ab1a0123afc

  • SHA1

    16bb42d7b6ec5536c06c4d7e424633940f61263d

  • SHA256

    aa1726ec4e7bc607566c3c181498b479506c40449f69319a7bf0981f4e052bfe

  • SHA512

    e815a803e83c7b1e8584a043286503842c8c79b4be7193b92950a0df637be661b53de4bf473278b5c038097af9fd2213908a5b90527d232205d1e6eb226d11b5

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.atlmexco.com
  • Port:
    587
  • Username:
    maksat@atlmexco.com
  • Password:
    Ma1301

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Scan docs.exe
    "C:\Users\Admin\AppData\Local\Temp\Scan docs.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DfvHLzAuHD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8212.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2256
    • C:\Users\Admin\AppData\Local\Temp\Scan docs.exe
      "C:\Users\Admin\AppData\Local\Temp\Scan docs.exe"
      2⤵
        PID:1816
      • C:\Users\Admin\AppData\Local\Temp\Scan docs.exe
        "C:\Users\Admin\AppData\Local\Temp\Scan docs.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3620

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan docs.exe.log
      MD5

      5b50852bf977f644bcd5997b7b5883c1

      SHA1

      8b53694b796620422b366dc5b8dbb3ce3060473c

      SHA256

      667bc8c8d53eddf6355877344b669db4fb9762e6320afc7316c3786213a254a9

      SHA512

      7e794fa7de5eca585000ef840ca821f36205d25b389747339d8b8d58b1ef3cd16306e62288f86027cbe6a76eeccc9dc7634a11c94ba551f3ce42ee874fac712d

    • C:\Users\Admin\AppData\Local\Temp\tmp8212.tmp
      MD5

      aeb3b18ca1226f9bfa86002b28b6eede

      SHA1

      dc64dbb3000783766e00679552311a62d9823a1d

      SHA256

      3dbc8ab2993df9de1cd723fa3dcbd8dde9f40f7a9eb9407c56d48a3d85ad15b4

      SHA512

      b94df4cb1a6deea3c4ac0cd73f006c48964c9c655ea260db46ec8c9e457ef74ca72eb57e2966caeee15c8029d22b529f10c37cb27f4ab99fa4f01857cc0135ce

    • memory/1400-123-0x000000000A240000-0x000000000A2D2000-memory.dmp
      Filesize

      584KB

    • memory/1400-124-0x0000000006650000-0x00000000066B9000-memory.dmp
      Filesize

      420KB

    • memory/1400-119-0x0000000007DA0000-0x0000000007DA1000-memory.dmp
      Filesize

      4KB

    • memory/1400-120-0x0000000007CB0000-0x0000000007CB1000-memory.dmp
      Filesize

      4KB

    • memory/1400-121-0x0000000007F60000-0x0000000007F61000-memory.dmp
      Filesize

      4KB

    • memory/1400-122-0x000000000A1F0000-0x000000000A200000-memory.dmp
      Filesize

      64KB

    • memory/1400-114-0x0000000000B50000-0x0000000000B51000-memory.dmp
      Filesize

      4KB

    • memory/1400-118-0x00000000082A0000-0x00000000082A1000-memory.dmp
      Filesize

      4KB

    • memory/1400-116-0x0000000007950000-0x0000000007951000-memory.dmp
      Filesize

      4KB

    • memory/1400-117-0x0000000007D00000-0x0000000007D01000-memory.dmp
      Filesize

      4KB

    • memory/2256-125-0x0000000000000000-mapping.dmp
    • memory/3620-127-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/3620-128-0x00000000004375DE-mapping.dmp
    • memory/3620-134-0x0000000004F00000-0x00000000053FE000-memory.dmp
      Filesize

      5.0MB

    • memory/3620-135-0x00000000050D0000-0x00000000050D1000-memory.dmp
      Filesize

      4KB

    • memory/3620-136-0x0000000005BA0000-0x0000000005BA1000-memory.dmp
      Filesize

      4KB