Analysis

  • max time kernel
    123s
  • max time network
    166s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    21-10-2021 03:58

General

  • Target

    ??40208 Accell Asia Limited Taiwan Branch.exe

  • Size

    540KB

  • MD5

    1a1063bd01a0f01cecb94f9efc1bf7f1

  • SHA1

    c4ef80030868b1e8dcda424e082004cc8af4e66f

  • SHA256

    bd492d0d70877fb5b6eeb357cb8c57efa47df4d5d7cc6547958da94cbfddd7d3

  • SHA512

    5be288dcc77978c974f54cad7822c40c61fb0462efb99d621b99d54ab01343e6f629d257d527a517843c3f58d5f0c38f9dd15d5713433802ada83f71ef056b4f

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\__40208 Accell Asia Limited Taiwan Branch.exe
    "C:\Users\Admin\AppData\Local\Temp\__40208 Accell Asia Limited Taiwan Branch.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\__40208 Accell Asia Limited Taiwan Branch.exe
      "C:\Users\Admin\AppData\Local\Temp\__40208 Accell Asia Limited Taiwan Branch.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2552

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsh15E6.tmp\jxalbh.dll
    MD5

    f6dc83a169c1cb3d0330da420f2157a1

    SHA1

    9b528977445219b3b6c422dd650f85fc3374a76a

    SHA256

    44480473703cf2507ea7921710f13a151b0d22426b6696d3a8689d89d1954f58

    SHA512

    8b2b6f09bf10ceb36298ccc7c7745df4735e766576ef4dd20daa36e41101f02d84607dc162f31ad8c0c98ae25a7b546273340852da7dfdfe18f747f4daf2071b

  • memory/2552-116-0x0000000000400000-0x000000000044B000-memory.dmp
    Filesize

    300KB

  • memory/2552-117-0x000000000040188B-mapping.dmp
  • memory/2552-118-0x0000000000400000-0x000000000044B000-memory.dmp
    Filesize

    300KB

  • memory/2552-119-0x00000000005C0000-0x00000000005C1000-memory.dmp
    Filesize

    4KB

  • memory/2552-121-0x00000000005C7000-0x00000000005C8000-memory.dmp
    Filesize

    4KB

  • memory/2552-120-0x00000000005C1000-0x00000000005C2000-memory.dmp
    Filesize

    4KB

  • memory/2552-122-0x00000000005C2000-0x00000000005C4000-memory.dmp
    Filesize

    8KB

  • memory/2552-123-0x00000000005C8000-0x00000000005C9000-memory.dmp
    Filesize

    4KB

  • memory/2552-124-0x00000000005CD000-0x00000000005CF000-memory.dmp
    Filesize

    8KB