Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    22-10-2021 09:20

General

  • Target

    Documents Of Shipping.exe

  • Size

    346KB

  • MD5

    5fe507eb6a76faf15380d259508346f4

  • SHA1

    0050d63477be4f3d5d807d1cea67a5bad03edb38

  • SHA256

    ec75c480db2874572e44afbf2bd961b1f744a45dc4eb1f2557c5d299093089b1

  • SHA512

    9707c6ce53c9f5d345eb44da851ff3640f7341acf9752d5af8f89981e1bc15c93d5a2bd9e6a289d2f69dc7e4bfd0dbd3451e585b331dc0ccf9e83d568f966253

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot2021562129:AAG5jOD-8o1ZVDhFUnGUw6bzmNZXXfUtGN0/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Documents Of Shipping.exe
    "C:\Users\Admin\AppData\Local\Temp\Documents Of Shipping.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\Documents Of Shipping.exe
      "C:\Users\Admin\AppData\Local\Temp\Documents Of Shipping.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:856

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso1537.tmp\dkznkxdbox.dll
    MD5

    0b7ad8699439ce182b38af57ce27df00

    SHA1

    be832ae4c9122e1daf351a6724cbefcd4e4ff710

    SHA256

    40e4279cf55da1330a38525edaacba9c3d7ad3b135f932475825da7eaad5c5b2

    SHA512

    b8b1ddb60a38c0981ba97089a902dea44ffd32fd91c6a8d6a7412680cb7fa32d3a944e9c230ab40a0a0c9cbbf181cfab3a164e84f3007d4004f9e8b2930aa6a6

  • memory/856-57-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/856-58-0x000000000040188B-mapping.dmp
  • memory/856-60-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/856-61-0x0000000001DE0000-0x0000000001E17000-memory.dmp
    Filesize

    220KB

  • memory/856-64-0x0000000001D62000-0x0000000001D63000-memory.dmp
    Filesize

    4KB

  • memory/856-63-0x0000000001D61000-0x0000000001D62000-memory.dmp
    Filesize

    4KB

  • memory/856-66-0x0000000001D64000-0x0000000001D65000-memory.dmp
    Filesize

    4KB

  • memory/856-65-0x0000000001D63000-0x0000000001D64000-memory.dmp
    Filesize

    4KB

  • memory/948-55-0x0000000075BA1000-0x0000000075BA3000-memory.dmp
    Filesize

    8KB