Analysis

  • max time kernel
    136s
  • max time network
    103s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    28-09-2021 09:56

General

  • Target

    VESSEL PARTICULARS - NYK LINE.doc.exe

  • Size

    384KB

  • MD5

    93445df2c96362810e0395c5c867700e

  • SHA1

    645f936406b04fbfb737bbffb5678d5255c6ec34

  • SHA256

    ecb4fe719a7fc1365d70ec9db8b3c74cb4bf8968324c25d3817fcc5628fae6fa

  • SHA512

    bfcfc7c220963f8269537b737d71251dfe3a9f6a800e7d65e3a1fd449a4f3f9e12c7f20207543009f8655a4fdfa672a11173de27e682478da4f15a0875f3bae8

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.boydsteamships.com
  • Port:
    587
  • Username:
    csanchez@boydsteamships.com
  • Password:
    co*tNjEBt4

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 2 IoCs
  • Nirsoft 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
    "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1188
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3840
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 3180
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3836
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 2600
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2340
    • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
      "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
      2⤵
        PID:1308
      • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
        "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
        2⤵
          PID:1140
        • C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe
          "C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3160

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VESSEL PARTICULARS - NYK LINE.doc.exe.log
        MD5

        9e7845217df4a635ec4341c3d52ed685

        SHA1

        d65cb39d37392975b038ce503a585adadb805da5

        SHA256

        d60e596ed3d5c13dc9f1660e6d870d99487e1383891437645c4562a9ecaa8c9b

        SHA512

        307c3b4d4f2655bdeb177e7b9c981ca27513618903f02c120caa755c9da5a8dd03ebab660b56108a680720a97c1e9596692490aede18cc4bd77b9fc3d8e68aa1

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        MD5

        e71a0a7e48b10bde0a9c54387762f33e

        SHA1

        fed75947f1163b00096e24a46e67d9c21e7eeebd

        SHA256

        83d7be67d0eb544d655cc8e8eb687c26f772d6a40ebf8394e5c12b248976a2de

        SHA512

        394c25daef6143de894505189b1edcdffb82fd6ab9de1c9e43865fb790803ff5c384debfe16236d4a9d95a78d3eea548d3cef332ed5a6881ac9c50d252c3c34a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        4355468aa7996bf8fed21f6ad2d9e1d3

        SHA1

        5f7734c4ed0a7a0e0ef63f3289b2aa1a9a7b94c3

        SHA256

        8869e69efce43d4e48b44bbbfc4aa26dd0a1258d2ea8066a60843a784cf1a2da

        SHA512

        a1fb28ed1b1a539630b98bf87192e7fa34d5e59715a0af1085208ceb2eef1722cecba2955c6c7c9ab5fbc9cb3f0165003abb7524d94b891b349a41ab9ebf1417

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        65fe0700d3e07034d79936487518921b

        SHA1

        67158e450670b868b413348107f2a306990c54d3

        SHA256

        b14013dc4244f4e812537d635ea3846ca337a0647c928d934576a76d1c751f31

        SHA512

        ee9c3544ed4dde2c69ed288b25a032a36147d70726776d34c3e5f60206664787115970ce1683f183c787f59f694187c98978973b66e0687fa0c45c06c55b7b90

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        MD5

        65fe0700d3e07034d79936487518921b

        SHA1

        67158e450670b868b413348107f2a306990c54d3

        SHA256

        b14013dc4244f4e812537d635ea3846ca337a0647c928d934576a76d1c751f31

        SHA512

        ee9c3544ed4dde2c69ed288b25a032a36147d70726776d34c3e5f60206664787115970ce1683f183c787f59f694187c98978973b66e0687fa0c45c06c55b7b90

      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        MD5

        17fc12902f4769af3a9271eb4e2dacce

        SHA1

        9a4a1581cc3971579574f837e110f3bd6d529dab

        SHA256

        29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

        SHA512

        036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        MD5

        17fc12902f4769af3a9271eb4e2dacce

        SHA1

        9a4a1581cc3971579574f837e110f3bd6d529dab

        SHA256

        29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

        SHA512

        036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        MD5

        17fc12902f4769af3a9271eb4e2dacce

        SHA1

        9a4a1581cc3971579574f837e110f3bd6d529dab

        SHA256

        29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

        SHA512

        036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        MD5

        17fc12902f4769af3a9271eb4e2dacce

        SHA1

        9a4a1581cc3971579574f837e110f3bd6d529dab

        SHA256

        29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

        SHA512

        036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        MD5

        17fc12902f4769af3a9271eb4e2dacce

        SHA1

        9a4a1581cc3971579574f837e110f3bd6d529dab

        SHA256

        29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

        SHA512

        036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

      • memory/740-504-0x00000000078D0000-0x000000000790C000-memory.dmp
        Filesize

        240KB

      • memory/740-116-0x0000000005780000-0x0000000005781000-memory.dmp
        Filesize

        4KB

      • memory/740-117-0x0000000005190000-0x0000000005191000-memory.dmp
        Filesize

        4KB

      • memory/740-505-0x0000000000E20000-0x0000000000E44000-memory.dmp
        Filesize

        144KB

      • memory/740-114-0x00000000008E0000-0x00000000008E1000-memory.dmp
        Filesize

        4KB

      • memory/740-118-0x0000000005170000-0x0000000005171000-memory.dmp
        Filesize

        4KB

      • memory/740-119-0x0000000005280000-0x000000000577E000-memory.dmp
        Filesize

        5.0MB

      • memory/1168-136-0x00000000073C0000-0x00000000073C1000-memory.dmp
        Filesize

        4KB

      • memory/1168-141-0x0000000007710000-0x0000000007711000-memory.dmp
        Filesize

        4KB

      • memory/1168-140-0x00000000073C2000-0x00000000073C3000-memory.dmp
        Filesize

        4KB

      • memory/1168-120-0x0000000000000000-mapping.dmp
      • memory/1168-206-0x00000000073C3000-0x00000000073C4000-memory.dmp
        Filesize

        4KB

      • memory/1168-159-0x0000000008790000-0x0000000008791000-memory.dmp
        Filesize

        4KB

      • memory/1188-139-0x0000000004B32000-0x0000000004B33000-memory.dmp
        Filesize

        4KB

      • memory/1188-207-0x000000000A420000-0x000000000A421000-memory.dmp
        Filesize

        4KB

      • memory/1188-121-0x0000000000000000-mapping.dmp
      • memory/1188-205-0x0000000004B33000-0x0000000004B34000-memory.dmp
        Filesize

        4KB

      • memory/1188-132-0x0000000007510000-0x0000000007511000-memory.dmp
        Filesize

        4KB

      • memory/1188-137-0x0000000004B30000-0x0000000004B31000-memory.dmp
        Filesize

        4KB

      • memory/1292-144-0x0000000006BB0000-0x0000000006BB1000-memory.dmp
        Filesize

        4KB

      • memory/1292-172-0x0000000008990000-0x0000000008991000-memory.dmp
        Filesize

        4KB

      • memory/1292-153-0x0000000007460000-0x0000000007461000-memory.dmp
        Filesize

        4KB

      • memory/1292-150-0x00000000074E0000-0x00000000074E1000-memory.dmp
        Filesize

        4KB

      • memory/1292-180-0x0000000008920000-0x0000000008921000-memory.dmp
        Filesize

        4KB

      • memory/1292-147-0x00000000072F0000-0x00000000072F1000-memory.dmp
        Filesize

        4KB

      • memory/1292-122-0x0000000000000000-mapping.dmp
      • memory/1292-135-0x0000000006610000-0x0000000006611000-memory.dmp
        Filesize

        4KB

      • memory/1292-129-0x0000000000CB0000-0x0000000000CB1000-memory.dmp
        Filesize

        4KB

      • memory/1292-177-0x00000000088B0000-0x00000000088B1000-memory.dmp
        Filesize

        4KB

      • memory/1292-203-0x0000000006613000-0x0000000006614000-memory.dmp
        Filesize

        4KB

      • memory/1292-138-0x0000000006612000-0x0000000006613000-memory.dmp
        Filesize

        4KB

      • memory/1292-156-0x0000000007C30000-0x0000000007C31000-memory.dmp
        Filesize

        4KB

      • memory/2340-513-0x0000000000000000-mapping.dmp
      • memory/2600-511-0x0000000000000000-mapping.dmp
      • memory/3160-515-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/3160-516-0x0000000000436ABE-mapping.dmp
      • memory/3160-522-0x00000000056F0000-0x00000000056F1000-memory.dmp
        Filesize

        4KB

      • memory/3180-506-0x0000000000000000-mapping.dmp
      • memory/3836-509-0x0000000000000000-mapping.dmp
      • memory/3840-454-0x0000000004B83000-0x0000000004B84000-memory.dmp
        Filesize

        4KB

      • memory/3840-421-0x0000000004B82000-0x0000000004B83000-memory.dmp
        Filesize

        4KB

      • memory/3840-420-0x0000000004B80000-0x0000000004B81000-memory.dmp
        Filesize

        4KB

      • memory/3840-408-0x0000000000000000-mapping.dmp