Analysis

  • max time kernel
    126s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    28-09-2021 09:56

General

  • Target

    VESSEL PARTICULARS - NYK LINE.doc.exe

  • Size

    384KB

  • MD5

    93445df2c96362810e0395c5c867700e

  • SHA1

    645f936406b04fbfb737bbffb5678d5255c6ec34

  • SHA256

    ecb4fe719a7fc1365d70ec9db8b3c74cb4bf8968324c25d3817fcc5628fae6fa

  • SHA512

    bfcfc7c220963f8269537b737d71251dfe3a9f6a800e7d65e3a1fd449a4f3f9e12c7f20207543009f8655a4fdfa672a11173de27e682478da4f15a0875f3bae8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.boydsteamships.com
  • Port:
    587
  • Username:
    csanchez@boydsteamships.com
  • Password:
    co*tNjEBt4

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 3 IoCs
  • Nirsoft 13 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
    "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1012
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1344
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 432
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1624
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 544
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:972
    • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
      "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
      2⤵
        PID:1808
      • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
        "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1388

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      f6051261f55b4d361de2d448ab78df9e

      SHA1

      cd3d3090c97ee6250dba2e69de95a216ffac6aa3

      SHA256

      0aed3f675550e0dddf7a1896db4757134a498aaaab13e2e6c5ebe45167f68993

      SHA512

      caba05a03d323fae3bea404781fa9d631a97a73e41f43961907df57ad71389c8748272b02a156e7f1b10ff9228994f0720aca451aea825c15edba4a7eb7735e3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      f6051261f55b4d361de2d448ab78df9e

      SHA1

      cd3d3090c97ee6250dba2e69de95a216ffac6aa3

      SHA256

      0aed3f675550e0dddf7a1896db4757134a498aaaab13e2e6c5ebe45167f68993

      SHA512

      caba05a03d323fae3bea404781fa9d631a97a73e41f43961907df57ad71389c8748272b02a156e7f1b10ff9228994f0720aca451aea825c15edba4a7eb7735e3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      f6051261f55b4d361de2d448ab78df9e

      SHA1

      cd3d3090c97ee6250dba2e69de95a216ffac6aa3

      SHA256

      0aed3f675550e0dddf7a1896db4757134a498aaaab13e2e6c5ebe45167f68993

      SHA512

      caba05a03d323fae3bea404781fa9d631a97a73e41f43961907df57ad71389c8748272b02a156e7f1b10ff9228994f0720aca451aea825c15edba4a7eb7735e3

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • memory/432-82-0x0000000000000000-mapping.dmp
    • memory/544-93-0x0000000000000000-mapping.dmp
    • memory/972-98-0x0000000000000000-mapping.dmp
    • memory/1012-68-0x00000000022B1000-0x00000000022B2000-memory.dmp
      Filesize

      4KB

    • memory/1012-67-0x00000000022B2000-0x00000000022B4000-memory.dmp
      Filesize

      8KB

    • memory/1012-59-0x0000000000000000-mapping.dmp
    • memory/1012-65-0x00000000022B0000-0x00000000022B1000-memory.dmp
      Filesize

      4KB

    • memory/1292-66-0x0000000002390000-0x0000000002FDA000-memory.dmp
      Filesize

      12.3MB

    • memory/1292-69-0x0000000002390000-0x0000000002FDA000-memory.dmp
      Filesize

      12.3MB

    • memory/1292-57-0x0000000000000000-mapping.dmp
    • memory/1292-60-0x0000000076961000-0x0000000076963000-memory.dmp
      Filesize

      8KB

    • memory/1332-58-0x0000000000000000-mapping.dmp
    • memory/1332-71-0x0000000002310000-0x0000000002F5A000-memory.dmp
      Filesize

      12.3MB

    • memory/1332-70-0x0000000002310000-0x0000000002F5A000-memory.dmp
      Filesize

      12.3MB

    • memory/1344-72-0x0000000000000000-mapping.dmp
    • memory/1344-75-0x0000000002460000-0x00000000030AA000-memory.dmp
      Filesize

      12.3MB

    • memory/1344-77-0x0000000002460000-0x00000000030AA000-memory.dmp
      Filesize

      12.3MB

    • memory/1344-76-0x0000000002460000-0x00000000030AA000-memory.dmp
      Filesize

      12.3MB

    • memory/1388-101-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1388-102-0x0000000000436ABE-mapping.dmp
    • memory/1388-103-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1388-105-0x0000000004960000-0x0000000004961000-memory.dmp
      Filesize

      4KB

    • memory/1624-88-0x0000000000000000-mapping.dmp
    • memory/1756-54-0x00000000011D0000-0x00000000011D1000-memory.dmp
      Filesize

      4KB

    • memory/1756-78-0x0000000000B80000-0x0000000000BBC000-memory.dmp
      Filesize

      240KB

    • memory/1756-79-0x0000000004A70000-0x0000000004A94000-memory.dmp
      Filesize

      144KB

    • memory/1756-56-0x0000000004B80000-0x0000000004B81000-memory.dmp
      Filesize

      4KB