Analysis

  • max time kernel
    116s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 17:15

General

  • Target

    Picture.exe

  • Size

    918KB

  • MD5

    cf43b0fc3cf4393bb542bd212a1af029

  • SHA1

    44ff1cbf0831d6176bd6e98a46f354800e9d09d0

  • SHA256

    5d7566ee48f7c1525a1d0e5cf2e5463929d7ad9fe55519acec2a4fcb19507f7e

  • SHA512

    5279f393b145d8a4b0672ce5f75f8f777919e0b82ff3a7c3637e5753194fbbd4ace3a173e77d670ad7ab7f0d3cf5a33b65a3bb047cb16349178aea137382e04c

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1802838691:AAHG-LDFE4ym6sqdeNCoNwT9JyuuNVsehko/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • AgentTesla Payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 55 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Picture.exe
    "C:\Users\Admin\AppData\Local\Temp\Picture.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Users\Admin\AppData\Local\Temp\3582-490\Picture.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\Picture.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\Picture.exe
        C:\Users\Admin\AppData\Local\Temp\Picture.exe
        3⤵
        • Executes dropped EXE
        PID:3156
      • C:\Users\Admin\AppData\Local\Temp\Picture.exe
        C:\Users\Admin\AppData\Local\Temp\Picture.exe
        3⤵
        • Executes dropped EXE
        PID:1504
      • C:\Users\Admin\AppData\Local\Temp\Picture.exe
        C:\Users\Admin\AppData\Local\Temp\Picture.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Picture.exe.log
    MD5

    4a30a8132195c1aa1a62b78676b178d9

    SHA1

    506e6d99a2ba08c9d3553af30daaaa0fc46ae4be

    SHA256

    71636c227625058652c089035480b7bb3e5795f3998bc9823c401029fc844a20

    SHA512

    3272b5129525c2b8f7efb99f5a2115cf2572480ff6938ca80e63f02c52588216f861307b9ef962ba015787cae0d5a95e74ebb5fe4b35b34f1c4f3a7deac8ce09

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Picture.exe
    MD5

    dbedce8e808899925400d5054a0c23f5

    SHA1

    74bd0fb71ffb36f8b8328969f1db3a815904127f

    SHA256

    65ad5de571c458b30af37b85e2201a843c3e35ee90e358fa04e6b90fefe2e315

    SHA512

    ed6c86e9ae609088f3498b0fb07736234257d74d3f15b28f54beac8d90a1ca0014ce40c44958f92def621d6da176786be359029f9f2b898092228b0b55fc47dc

  • C:\Users\Admin\AppData\Local\Temp\3582-490\Picture.exe
    MD5

    dbedce8e808899925400d5054a0c23f5

    SHA1

    74bd0fb71ffb36f8b8328969f1db3a815904127f

    SHA256

    65ad5de571c458b30af37b85e2201a843c3e35ee90e358fa04e6b90fefe2e315

    SHA512

    ed6c86e9ae609088f3498b0fb07736234257d74d3f15b28f54beac8d90a1ca0014ce40c44958f92def621d6da176786be359029f9f2b898092228b0b55fc47dc

  • C:\Users\Admin\AppData\Local\Temp\Picture.exe
    MD5

    dbedce8e808899925400d5054a0c23f5

    SHA1

    74bd0fb71ffb36f8b8328969f1db3a815904127f

    SHA256

    65ad5de571c458b30af37b85e2201a843c3e35ee90e358fa04e6b90fefe2e315

    SHA512

    ed6c86e9ae609088f3498b0fb07736234257d74d3f15b28f54beac8d90a1ca0014ce40c44958f92def621d6da176786be359029f9f2b898092228b0b55fc47dc

  • C:\Users\Admin\AppData\Local\Temp\Picture.exe
    MD5

    dbedce8e808899925400d5054a0c23f5

    SHA1

    74bd0fb71ffb36f8b8328969f1db3a815904127f

    SHA256

    65ad5de571c458b30af37b85e2201a843c3e35ee90e358fa04e6b90fefe2e315

    SHA512

    ed6c86e9ae609088f3498b0fb07736234257d74d3f15b28f54beac8d90a1ca0014ce40c44958f92def621d6da176786be359029f9f2b898092228b0b55fc47dc

  • C:\Users\Admin\AppData\Local\Temp\Picture.exe
    MD5

    dbedce8e808899925400d5054a0c23f5

    SHA1

    74bd0fb71ffb36f8b8328969f1db3a815904127f

    SHA256

    65ad5de571c458b30af37b85e2201a843c3e35ee90e358fa04e6b90fefe2e315

    SHA512

    ed6c86e9ae609088f3498b0fb07736234257d74d3f15b28f54beac8d90a1ca0014ce40c44958f92def621d6da176786be359029f9f2b898092228b0b55fc47dc

  • C:\Users\Admin\AppData\Local\Temp\Picture.exe
    MD5

    dbedce8e808899925400d5054a0c23f5

    SHA1

    74bd0fb71ffb36f8b8328969f1db3a815904127f

    SHA256

    65ad5de571c458b30af37b85e2201a843c3e35ee90e358fa04e6b90fefe2e315

    SHA512

    ed6c86e9ae609088f3498b0fb07736234257d74d3f15b28f54beac8d90a1ca0014ce40c44958f92def621d6da176786be359029f9f2b898092228b0b55fc47dc

  • memory/1172-148-0x0000000005100000-0x00000000055FE000-memory.dmp
    Filesize

    5.0MB

  • memory/1172-142-0x00000000052E0000-0x00000000052E1000-memory.dmp
    Filesize

    4KB

  • memory/1172-143-0x0000000005100000-0x00000000055FE000-memory.dmp
    Filesize

    5.0MB

  • memory/1172-144-0x0000000005DF0000-0x0000000005DF1000-memory.dmp
    Filesize

    4KB

  • memory/1172-134-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1172-135-0x000000000043770E-mapping.dmp
  • memory/1172-145-0x0000000005E80000-0x0000000005E81000-memory.dmp
    Filesize

    4KB

  • memory/2044-121-0x0000000004E70000-0x0000000004E71000-memory.dmp
    Filesize

    4KB

  • memory/2044-131-0x0000000004E40000-0x000000000533E000-memory.dmp
    Filesize

    5.0MB

  • memory/2044-130-0x0000000008BA0000-0x0000000008BA1000-memory.dmp
    Filesize

    4KB

  • memory/2044-129-0x00000000089A0000-0x0000000008A16000-memory.dmp
    Filesize

    472KB

  • memory/2044-124-0x0000000006F40000-0x0000000006F41000-memory.dmp
    Filesize

    4KB

  • memory/2044-123-0x0000000006E60000-0x0000000006EBB000-memory.dmp
    Filesize

    364KB

  • memory/2044-122-0x0000000004E40000-0x000000000533E000-memory.dmp
    Filesize

    5.0MB

  • memory/2044-114-0x0000000000000000-mapping.dmp
  • memory/2044-120-0x0000000004EE0000-0x0000000004EE1000-memory.dmp
    Filesize

    4KB

  • memory/2044-119-0x0000000005340000-0x0000000005341000-memory.dmp
    Filesize

    4KB

  • memory/2044-117-0x0000000000550000-0x0000000000551000-memory.dmp
    Filesize

    4KB