Analysis

  • max time kernel
    120s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    21-10-2021 15:18

General

  • Target

    Halkbank_Ekstre_20211020_101606_507653.exe

  • Size

    48KB

  • MD5

    1b21040231567a32423b79ea6e4765ca

  • SHA1

    b2b30b5a57e6f8f1f36a385b691bd1f0e4bd57b3

  • SHA256

    36b46699b20b4ce357b902c256b8bd938898c79fd0894741173dc67843ec1700

  • SHA512

    2449041403ee540c4fb8007fdfbc40ab742f5698be391ad75a1f7aa3ae6756676457e8b1d0f582e25c6afa33b8449f65c2aab5069bcbd10f4907b8355ae4d27e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.vivaldi.net
  • Port:
    587
  • Username:
    instigator@vivaldi.net
  • Password:
    Davidchukwuka2016

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • AgentTesla Payload 1 IoCs
  • Nirsoft 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 11 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe
    "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe"
    1⤵
    • Windows security modification
    • Accesses Microsoft Outlook profiles
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:3124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\뽉뽫뽇뽎뾄뽺뽐뽯뽽뽐뽋뽍뽈뽉뽐\svchost.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:376
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Cursors\뽉뽫뽇뽎뾄뽺뽐뽯뽽뽐뽋뽍뽈뽉뽐\svchost.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1780
    • C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe" /SpecialRun 4101d8 1428
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2152
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20211020_101606_507653.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1472

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Disabling Security Tools

3
T1089

Modify Registry

3
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    MD5

    db01a2c1c7e70b2b038edf8ad5ad9826

    SHA1

    540217c647a73bad8d8a79e3a0f3998b5abd199b

    SHA256

    413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

    SHA512

    c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    MD5

    0b5d94d20be9eecbaed3dddd04143f07

    SHA1

    c677d0355f4cc7301075a554adc889bce502e15a

    SHA256

    3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

    SHA512

    395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    MD5

    34cbce7a86066983ddec1c5c7316fa24

    SHA1

    a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9

    SHA256

    23bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42

    SHA512

    f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    MD5

    34cbce7a86066983ddec1c5c7316fa24

    SHA1

    a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9

    SHA256

    23bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42

    SHA512

    f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    MD5

    34cbce7a86066983ddec1c5c7316fa24

    SHA1

    a1135a1ddbfd3ae8079f7e449d7978fdb92f3bd9

    SHA256

    23bf6d99f757f6728c8c896676b0707e190e1acb80ec8758696fa3efa8d6cb42

    SHA512

    f6537a61341ef316200de61d4185d7fdf8169fa5f01446241d34dc74ffdf9edfd520c5d06d54c9df8a8d1eb0eeab53141d75c88f157b72cbcb6b7f0bdb84e769

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    3b31d0729bdb0704d7fe26f8fbb3a010

    SHA1

    ff9cc7c004bc51d563e03bc84898bb0298bddf9c

    SHA256

    0030b3ae1a8658e4ec308077a129fa08a8ec2b357721068dbe6aaf8bf033d998

    SHA512

    38e9bc69f62ab0e44defdcb156fd2987cbf18c75b01c6afedb7a8282a56921b9a89529848e3c31201bb423669589894cedf51887646719056f2b1a3f77c030ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    c0fd8ff90e449bf96c5b35ae12a59fe7

    SHA1

    b2b6840922de19e4cb4981c88a3d88225775e6d2

    SHA256

    e8dad7feac362bc4c63f1509dbc03120da004c17cb3305905a1d985ac7386e4e

    SHA512

    f1a6a64c523699113b5e7f53ce893062ae7f9e7b9f9745838092f208bd4de8d38adc735ed9433a32e07c125203d3f7e76540673025bf2e16a448e9d5e1c67709

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    c0fd8ff90e449bf96c5b35ae12a59fe7

    SHA1

    b2b6840922de19e4cb4981c88a3d88225775e6d2

    SHA256

    e8dad7feac362bc4c63f1509dbc03120da004c17cb3305905a1d985ac7386e4e

    SHA512

    f1a6a64c523699113b5e7f53ce893062ae7f9e7b9f9745838092f208bd4de8d38adc735ed9433a32e07c125203d3f7e76540673025bf2e16a448e9d5e1c67709

  • C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • C:\Users\Admin\AppData\Local\Temp\8c86bd8d-00ed-4530-904d-01e3e783216c\AdvancedRun.exe
    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • memory/376-121-0x0000000000000000-mapping.dmp
  • memory/376-161-0x00000000077D0000-0x00000000077D1000-memory.dmp
    Filesize

    4KB

  • memory/376-167-0x0000000007FA0000-0x0000000007FA1000-memory.dmp
    Filesize

    4KB

  • memory/376-125-0x0000000000E20000-0x0000000000E21000-memory.dmp
    Filesize

    4KB

  • memory/376-124-0x0000000000E20000-0x0000000000E21000-memory.dmp
    Filesize

    4KB

  • memory/376-218-0x000000007E7E0000-0x000000007E7E1000-memory.dmp
    Filesize

    4KB

  • memory/376-171-0x0000000000E20000-0x0000000000E21000-memory.dmp
    Filesize

    4KB

  • memory/376-150-0x00000000076F0000-0x00000000076F1000-memory.dmp
    Filesize

    4KB

  • memory/376-138-0x0000000000F70000-0x0000000000F71000-memory.dmp
    Filesize

    4KB

  • memory/376-141-0x0000000000F72000-0x0000000000F73000-memory.dmp
    Filesize

    4KB

  • memory/376-271-0x0000000000F73000-0x0000000000F74000-memory.dmp
    Filesize

    4KB

  • memory/520-212-0x000000007F490000-0x000000007F491000-memory.dmp
    Filesize

    4KB

  • memory/520-126-0x0000000000840000-0x0000000000841000-memory.dmp
    Filesize

    4KB

  • memory/520-174-0x0000000000840000-0x0000000000841000-memory.dmp
    Filesize

    4KB

  • memory/520-122-0x0000000000000000-mapping.dmp
  • memory/520-146-0x0000000006E50000-0x0000000006E51000-memory.dmp
    Filesize

    4KB

  • memory/520-139-0x0000000001240000-0x0000000001241000-memory.dmp
    Filesize

    4KB

  • memory/520-273-0x0000000001243000-0x0000000001244000-memory.dmp
    Filesize

    4KB

  • memory/520-142-0x0000000001242000-0x0000000001243000-memory.dmp
    Filesize

    4KB

  • memory/520-127-0x0000000000840000-0x0000000000841000-memory.dmp
    Filesize

    4KB

  • memory/520-128-0x00000000010F0000-0x00000000010F1000-memory.dmp
    Filesize

    4KB

  • memory/1428-144-0x0000000000000000-mapping.dmp
  • memory/1472-183-0x0000000004882000-0x0000000004883000-memory.dmp
    Filesize

    4KB

  • memory/1472-178-0x0000000001300000-0x0000000001301000-memory.dmp
    Filesize

    4KB

  • memory/1472-182-0x0000000004880000-0x0000000004881000-memory.dmp
    Filesize

    4KB

  • memory/1472-276-0x000000007F0C0000-0x000000007F0C1000-memory.dmp
    Filesize

    4KB

  • memory/1472-272-0x0000000004883000-0x0000000004884000-memory.dmp
    Filesize

    4KB

  • memory/1472-179-0x0000000001300000-0x0000000001301000-memory.dmp
    Filesize

    4KB

  • memory/1472-176-0x0000000000000000-mapping.dmp
  • memory/1780-134-0x0000000006E80000-0x0000000006E81000-memory.dmp
    Filesize

    4KB

  • memory/1780-275-0x0000000001203000-0x0000000001204000-memory.dmp
    Filesize

    4KB

  • memory/1780-170-0x00000000006D0000-0x00000000006D1000-memory.dmp
    Filesize

    4KB

  • memory/1780-164-0x0000000007D10000-0x0000000007D11000-memory.dmp
    Filesize

    4KB

  • memory/1780-123-0x0000000000000000-mapping.dmp
  • memory/1780-156-0x00000000075E0000-0x00000000075E1000-memory.dmp
    Filesize

    4KB

  • memory/1780-215-0x000000007F000000-0x000000007F001000-memory.dmp
    Filesize

    4KB

  • memory/1780-153-0x0000000006CA0000-0x0000000006CA1000-memory.dmp
    Filesize

    4KB

  • memory/1780-143-0x0000000001202000-0x0000000001203000-memory.dmp
    Filesize

    4KB

  • memory/1780-140-0x0000000001200000-0x0000000001201000-memory.dmp
    Filesize

    4KB

  • memory/1780-130-0x00000000006D0000-0x00000000006D1000-memory.dmp
    Filesize

    4KB

  • memory/1780-131-0x00000000006D0000-0x00000000006D1000-memory.dmp
    Filesize

    4KB

  • memory/2152-159-0x0000000000000000-mapping.dmp
  • memory/3124-115-0x0000000000130000-0x0000000000131000-memory.dmp
    Filesize

    4KB

  • memory/3124-133-0x00000000079C0000-0x00000000079C1000-memory.dmp
    Filesize

    4KB

  • memory/3124-177-0x0000000007A70000-0x0000000007AA6000-memory.dmp
    Filesize

    216KB

  • memory/3124-137-0x00000000078B0000-0x00000000078B1000-memory.dmp
    Filesize

    4KB

  • memory/3124-120-0x0000000007CE0000-0x0000000007CE1000-memory.dmp
    Filesize

    4KB

  • memory/3124-119-0x00000000043E0000-0x0000000004468000-memory.dmp
    Filesize

    544KB

  • memory/3124-118-0x00000000064F0000-0x00000000064F1000-memory.dmp
    Filesize

    4KB

  • memory/3124-117-0x00000000049F0000-0x00000000049F1000-memory.dmp
    Filesize

    4KB