Analysis

  • max time kernel
    159s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    20-09-2021 18:04

General

  • Target

    69a4737ab33facc809457a6bfa0aa2f2.exe

  • Size

    652KB

  • MD5

    69a4737ab33facc809457a6bfa0aa2f2

  • SHA1

    2dcedfdbcf527eb6680b4c4bce6f791b2681cae3

  • SHA256

    cde036f2afa7aab3e775edf993ec455176f25bba3dd9440d0853945e425131a3

  • SHA512

    08392e93d26da7a82e579fd53f9c0808cf081f970e36d3cd53f04c588d3f7fe6b5dbe837b521f8ff135399799fa9aa109d7f4772c56f0bc6fd4fe0349f85a367

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    CXXOxCs5

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • AgentTesla Payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69a4737ab33facc809457a6bfa0aa2f2.exe
    "C:\Users\Admin\AppData\Local\Temp\69a4737ab33facc809457a6bfa0aa2f2.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe"
        3⤵
        • Executes dropped EXE
        PID:1860
      • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1636

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • C:\Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\Google\Temp\GUMFBCB.tmp\GOFB2B~1.EXE
    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE
    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • \Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • \Users\Admin\AppData\Local\Temp\3582-490\69a4737ab33facc809457a6bfa0aa2f2.exe
    MD5

    2b0eb2dffd9788bfb9390e060f5e4bcc

    SHA1

    90e0551b0c063f40f7bd2b928665baca4c3dfa05

    SHA256

    0bec1813fd645f0c1dd84ddf277999b79f1c07a94e6574a345d70184d8bfbc47

    SHA512

    ffd9435f6c8dd999dff058808abd827ca79568cf127f72eca5f46627fca2547a983f05bbc73eec4f38f875cd499294032eda3fe37d2cec00be210a330fb4d734

  • memory/1036-60-0x0000000075051000-0x0000000075053000-memory.dmp
    Filesize

    8KB

  • memory/1636-80-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1636-82-0x0000000004C70000-0x0000000004C71000-memory.dmp
    Filesize

    4KB

  • memory/1636-78-0x000000000043759E-mapping.dmp
  • memory/1636-77-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1804-65-0x0000000000AC0000-0x0000000000AC1000-memory.dmp
    Filesize

    4KB

  • memory/1804-73-0x0000000004FE0000-0x000000000501A000-memory.dmp
    Filesize

    232KB

  • memory/1804-72-0x00000000046D0000-0x000000000472E000-memory.dmp
    Filesize

    376KB

  • memory/1804-71-0x0000000000520000-0x0000000000527000-memory.dmp
    Filesize

    28KB

  • memory/1804-67-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
    Filesize

    4KB

  • memory/1804-62-0x0000000000000000-mapping.dmp