Analysis

  • max time kernel
    137s
  • max time network
    123s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    01-12-2021 19:11

General

  • Target

    Pago completo.pdf____________________________________________________________________________.bat.exe

  • Size

    712KB

  • MD5

    a83b61598e32441b21cdff23029016a9

  • SHA1

    40233546b63190b7ee2d5734726a4fe73973e892

  • SHA256

    880f28a951f2267979cb470bfe3f779f8b722cf04bc693c3a8e5f9b95b0eeb0c

  • SHA512

    c994966c2dce2c25a3c922f9c2f834e09ba4474d763d3b5ea8cea2ebcc9637112fdf2c47b8976c994f8de445cd8e4e8a2a75bb1fd234acbb0a3d52aed726507a

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dcodjdh@china3

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pago completo.pdf____________________________________________________________________________.bat.exe
    "C:\Users\Admin\AppData\Local\Temp\Pago completo.pdf____________________________________________________________________________.bat.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\Pago completo.pdf____________________________________________________________________________.bat.exe
      "C:\Users\Admin\AppData\Local\Temp\Pago completo.pdf____________________________________________________________________________.bat.exe"
      2⤵
      • Drops file in Drivers directory
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2076

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Pago completo.pdf____________________________________________________________________________.bat.exe.log
    MD5

    f1181bc4bdff57024c4121f645548332

    SHA1

    d431ee3a3a5afcae2c4537b1d445054a0a95f6e6

    SHA256

    f1a7e138b25d0cb24bb4b23bd781b0dd357afd49d45e19ffa44cdb80170336ad

    SHA512

    cf8059f289bcb4f33e82a2c4851fade486bd449793a39718d49bc357efd09689150aedd277c5ebcf79b5ebb4bbe36f0cbb72510a50398bee804ffd9c889604e3

  • memory/2076-125-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2076-137-0x0000000005340000-0x000000000583E000-memory.dmp
    Filesize

    5.0MB

  • memory/2076-134-0x00000000060A0000-0x00000000060A1000-memory.dmp
    Filesize

    4KB

  • memory/2076-133-0x0000000005560000-0x0000000005561000-memory.dmp
    Filesize

    4KB

  • memory/2076-132-0x0000000005340000-0x000000000583E000-memory.dmp
    Filesize

    5.0MB

  • memory/2076-126-0x00000000004376EE-mapping.dmp
  • memory/2868-120-0x0000000007060000-0x0000000007061000-memory.dmp
    Filesize

    4KB

  • memory/2868-124-0x0000000009880000-0x00000000098EA000-memory.dmp
    Filesize

    424KB

  • memory/2868-123-0x00000000096E0000-0x00000000096E1000-memory.dmp
    Filesize

    4KB

  • memory/2868-122-0x0000000009490000-0x0000000009491000-memory.dmp
    Filesize

    4KB

  • memory/2868-121-0x00000000074C0000-0x00000000074C8000-memory.dmp
    Filesize

    32KB

  • memory/2868-115-0x00000000002A0000-0x00000000002A1000-memory.dmp
    Filesize

    4KB

  • memory/2868-119-0x0000000006FD0000-0x00000000074CE000-memory.dmp
    Filesize

    5.0MB

  • memory/2868-118-0x00000000070B0000-0x00000000070B1000-memory.dmp
    Filesize

    4KB

  • memory/2868-117-0x00000000074D0000-0x00000000074D1000-memory.dmp
    Filesize

    4KB