Analysis

  • max time kernel
    107s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 08:11

General

  • Target

    Shipping Documents.exe

  • Size

    1010KB

  • MD5

    545a001d325071a329dc49becbf9c5c2

  • SHA1

    23f64db23c119c556f572e4750b10de4b204d012

  • SHA256

    dc068269ba73ae7c96cae4f108ed356a66b1d8ba29ed1fd070ce31749c909bd9

  • SHA512

    585d2968490c40265319d96aaea92bf0bbe0a0db862ae3ce9e8d4618c055e22b2c39ef14fa644f5a75617f4121c626cbaacace1f3026c737bc64c71e9aac4629

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1635424534:AAEmSdFTyNmSh6Kk0U8EAlLQQg5g_gOyE74/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe
    "C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ddoBNYLYLqCNwt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5D05.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:852
    • C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe
      "C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1052

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5D05.tmp
    MD5

    1d6172db4c582ef14e6e6a342d1ebb3a

    SHA1

    506d3259a2d5170921768628ed7404240fb6e004

    SHA256

    d1cc80c8b54ab7ba13537f097b44f142bfae3549779b708b738a8675e9813074

    SHA512

    94c5cee36367bfdb5b9d67cd24b851ea81c40144c48ff8d224ff3e6ba63439583a0e4b3309870bb35dae5988682cc9fd027016db316cdf7f4ae1b9a18dc25738

  • memory/852-125-0x0000000000000000-mapping.dmp
  • memory/1052-135-0x0000000005E00000-0x0000000005E01000-memory.dmp
    Filesize

    4KB

  • memory/1052-134-0x0000000005520000-0x0000000005521000-memory.dmp
    Filesize

    4KB

  • memory/1052-133-0x00000000050A0000-0x000000000559E000-memory.dmp
    Filesize

    5.0MB

  • memory/1052-128-0x000000000043777E-mapping.dmp
  • memory/1052-127-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/4796-119-0x0000000005970000-0x0000000005971000-memory.dmp
    Filesize

    4KB

  • memory/4796-123-0x0000000001950000-0x00000000019D1000-memory.dmp
    Filesize

    516KB

  • memory/4796-124-0x0000000001A10000-0x0000000001A4C000-memory.dmp
    Filesize

    240KB

  • memory/4796-122-0x0000000005D10000-0x0000000005D2B000-memory.dmp
    Filesize

    108KB

  • memory/4796-121-0x0000000005A50000-0x0000000005F4E000-memory.dmp
    Filesize

    5.0MB

  • memory/4796-120-0x0000000005C70000-0x0000000005C71000-memory.dmp
    Filesize

    4KB

  • memory/4796-114-0x0000000000F10000-0x0000000000F11000-memory.dmp
    Filesize

    4KB

  • memory/4796-118-0x0000000005A50000-0x0000000005A51000-memory.dmp
    Filesize

    4KB

  • memory/4796-117-0x0000000005F50000-0x0000000005F51000-memory.dmp
    Filesize

    4KB

  • memory/4796-116-0x00000000059B0000-0x00000000059B1000-memory.dmp
    Filesize

    4KB