Analysis

  • max time kernel
    147s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    02-12-2021 13:50

General

  • Target

    DHL SHIPMENT NOTIFICATION 284748395PD.exe

  • Size

    478KB

  • MD5

    ad87619820aa1c150c35ef8bdb4a6b09

  • SHA1

    169c4b930585e5c4212662d208c7b7f66a692dc1

  • SHA256

    394fda858d125629741feb8afcc89b15425f643549097507d28a37338cff57ef

  • SHA512

    8fcf068d41beeeac5f7e6b8465ad0ef44a723665e89453fc1ca465a6e535e1be12fc08bf2fcf83db1317042bdae85d6147f02b98b2bc75d53613cee53083f1f9

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.aclthyaexports.net
  • Port:
    587
  • Username:
    firstlogs@aclthyaexports.net
  • Password:
    User@@12345

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHL SHIPMENT NOTIFICATION 284748395PD.exe
    "C:\Users\Admin\AppData\Local\Temp\DHL SHIPMENT NOTIFICATION 284748395PD.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eZwlvsggO.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3084
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eZwlvsggO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp73B5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1300
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1388

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp73B5.tmp
      MD5

      c36c9dbba9b0b8b3784770728f2f9081

      SHA1

      4076e9f91a013bc0d5e18d1dbec2d6cf1986af3c

      SHA256

      b3b1446f18fe68e127fec3f51ba2b81e1403283562d8e1558e62bdec66322b29

      SHA512

      d6cb467d4de3c0c68af007b09271641772c5761e85f7410682bef0ea6c345e12fdec8fae9b86788f897f41a407174470aa2b8fdb6e3d1c97fded2b48587788b6

    • memory/1388-148-0x0000000005730000-0x0000000005731000-memory.dmp
      Filesize

      4KB

    • memory/1388-140-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1388-141-0x00000000004375BE-mapping.dmp
    • memory/2784-128-0x0000000000000000-mapping.dmp
    • memory/3084-135-0x0000000007380000-0x0000000007381000-memory.dmp
      Filesize

      4KB

    • memory/3084-139-0x0000000007C90000-0x0000000007C91000-memory.dmp
      Filesize

      4KB

    • memory/3084-171-0x000000007F7A0000-0x000000007F7A1000-memory.dmp
      Filesize

      4KB

    • memory/3084-127-0x0000000000000000-mapping.dmp
    • memory/3084-172-0x0000000006DB3000-0x0000000006DB4000-memory.dmp
      Filesize

      4KB

    • memory/3084-129-0x00000000046B0000-0x00000000046B1000-memory.dmp
      Filesize

      4KB

    • memory/3084-130-0x00000000046B0000-0x00000000046B1000-memory.dmp
      Filesize

      4KB

    • memory/3084-131-0x0000000006BD0000-0x0000000006BD1000-memory.dmp
      Filesize

      4KB

    • memory/3084-132-0x00000000073F0000-0x00000000073F1000-memory.dmp
      Filesize

      4KB

    • memory/3084-170-0x0000000009640000-0x0000000009641000-memory.dmp
      Filesize

      4KB

    • memory/3084-134-0x00000000072E0000-0x00000000072E1000-memory.dmp
      Filesize

      4KB

    • memory/3084-169-0x0000000009270000-0x0000000009271000-memory.dmp
      Filesize

      4KB

    • memory/3084-136-0x0000000007C20000-0x0000000007C21000-memory.dmp
      Filesize

      4KB

    • memory/3084-137-0x0000000006DB0000-0x0000000006DB1000-memory.dmp
      Filesize

      4KB

    • memory/3084-138-0x0000000006DB2000-0x0000000006DB3000-memory.dmp
      Filesize

      4KB

    • memory/3084-164-0x0000000009100000-0x0000000009101000-memory.dmp
      Filesize

      4KB

    • memory/3084-157-0x0000000009140000-0x0000000009173000-memory.dmp
      Filesize

      204KB

    • memory/3084-150-0x00000000046B0000-0x00000000046B1000-memory.dmp
      Filesize

      4KB

    • memory/3084-146-0x0000000007B80000-0x0000000007B81000-memory.dmp
      Filesize

      4KB

    • memory/3084-147-0x0000000008440000-0x0000000008441000-memory.dmp
      Filesize

      4KB

    • memory/3084-149-0x0000000008360000-0x0000000008361000-memory.dmp
      Filesize

      4KB

    • memory/3092-120-0x0000000005760000-0x0000000005761000-memory.dmp
      Filesize

      4KB

    • memory/3092-121-0x0000000005140000-0x0000000005141000-memory.dmp
      Filesize

      4KB

    • memory/3092-122-0x0000000005120000-0x0000000005121000-memory.dmp
      Filesize

      4KB

    • memory/3092-125-0x00000000054D0000-0x00000000054D6000-memory.dmp
      Filesize

      24KB

    • memory/3092-118-0x0000000000880000-0x0000000000881000-memory.dmp
      Filesize

      4KB

    • memory/3092-123-0x00000000053D0000-0x00000000053D1000-memory.dmp
      Filesize

      4KB

    • memory/3092-124-0x0000000005260000-0x000000000575E000-memory.dmp
      Filesize

      5.0MB

    • memory/3092-126-0x0000000008CF0000-0x0000000008D5A000-memory.dmp
      Filesize

      424KB