Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    21-10-2021 15:18

General

  • Target

    Halkbank_Ekstre_20211020_101606_507653.exe

  • Size

    48KB

  • MD5

    1b21040231567a32423b79ea6e4765ca

  • SHA1

    b2b30b5a57e6f8f1f36a385b691bd1f0e4bd57b3

  • SHA256

    36b46699b20b4ce357b902c256b8bd938898c79fd0894741173dc67843ec1700

  • SHA512

    2449041403ee540c4fb8007fdfbc40ab742f5698be391ad75a1f7aa3ae6756676457e8b1d0f582e25c6afa33b8449f65c2aab5069bcbd10f4907b8355ae4d27e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vivaldi.net
  • Port:
    587
  • Username:
    instigator@vivaldi.net
  • Password:
    Davidchukwuka2016

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Windows security bypass 2 TTPs
  • AgentTesla Payload 2 IoCs
  • Nirsoft 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 9 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe
    "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe"
    1⤵
    • Loads dropped DLL
    • Windows security modification
    • Accesses Microsoft Outlook profiles
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:948
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\뽉뽫뽇뽎뾄뽺뽐뽯뽽뽐뽋뽍뽈뽉뽐\svchost.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1824
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1540
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\뽉뽫뽇뽎뾄뽺뽐뽯뽽뽐뽋뽍뽈뽉뽐\svchost.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960
    • C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe" /SpecialRun 4101d8 1320
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1604
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

3
T1089

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    b43ce162298c642003feeffd2788e501

    SHA1

    11f86b0b6ec32a08024cbef305e098f5edad4a73

    SHA256

    81eb850e8c5643b078f3b6ede1cd83cf17a04ba2e4b459b3505bed4bff2dd4ff

    SHA512

    aad92533cb2b497db061979192bb33d0d321f360065bea5b949b78886b31a8f5de53e78a77dc9ac796b6f142ed73fd132a0e2ba36ba07f56b21f29dbb9ba24f7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    MD5

    b43ce162298c642003feeffd2788e501

    SHA1

    11f86b0b6ec32a08024cbef305e098f5edad4a73

    SHA256

    81eb850e8c5643b078f3b6ede1cd83cf17a04ba2e4b459b3505bed4bff2dd4ff

    SHA512

    aad92533cb2b497db061979192bb33d0d321f360065bea5b949b78886b31a8f5de53e78a77dc9ac796b6f142ed73fd132a0e2ba36ba07f56b21f29dbb9ba24f7

  • \Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • \Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • \Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • \Users\Admin\AppData\Local\Temp\d3f41ba3-a411-4c04-8d2d-a265de6abcfa\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • memory/556-91-0x00000000023E0000-0x000000000302A000-memory.dmp
    Filesize

    12.3MB

  • memory/556-87-0x0000000000000000-mapping.dmp
  • memory/948-57-0x0000000075D31000-0x0000000075D33000-memory.dmp
    Filesize

    8KB

  • memory/948-59-0x0000000000590000-0x0000000000618000-memory.dmp
    Filesize

    544KB

  • memory/948-55-0x0000000001210000-0x0000000001211000-memory.dmp
    Filesize

    4KB

  • memory/948-89-0x0000000001120000-0x0000000001156000-memory.dmp
    Filesize

    216KB

  • memory/948-58-0x0000000004710000-0x0000000004711000-memory.dmp
    Filesize

    4KB

  • memory/960-82-0x0000000002441000-0x0000000002442000-memory.dmp
    Filesize

    4KB

  • memory/960-63-0x0000000000000000-mapping.dmp
  • memory/960-78-0x0000000002440000-0x0000000002441000-memory.dmp
    Filesize

    4KB

  • memory/960-84-0x0000000002442000-0x0000000002444000-memory.dmp
    Filesize

    8KB

  • memory/1320-68-0x0000000000000000-mapping.dmp
  • memory/1540-85-0x00000000003E2000-0x00000000003E4000-memory.dmp
    Filesize

    8KB

  • memory/1540-81-0x00000000003E1000-0x00000000003E2000-memory.dmp
    Filesize

    4KB

  • memory/1540-79-0x00000000003E0000-0x00000000003E1000-memory.dmp
    Filesize

    4KB

  • memory/1540-61-0x0000000000000000-mapping.dmp
  • memory/1604-75-0x0000000000000000-mapping.dmp
  • memory/1824-83-0x0000000002440000-0x000000000308A000-memory.dmp
    Filesize

    12.3MB

  • memory/1824-80-0x0000000002440000-0x000000000308A000-memory.dmp
    Filesize

    12.3MB

  • memory/1824-86-0x0000000002440000-0x000000000308A000-memory.dmp
    Filesize

    12.3MB

  • memory/1824-60-0x0000000000000000-mapping.dmp