Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    02-12-2021 19:21

General

  • Target

    winlogon.exe

  • Size

    462KB

  • MD5

    629f5bb8b5ee75e90c393ad9d96a1772

  • SHA1

    b09925a7163bef858657a1b39146fe27abb01f99

  • SHA256

    15637f2d530662c968272c1e6e48ca6a093f0c828edf0cbb5cd32d9af03b3ff5

  • SHA512

    3434c0b1f42533c42a4232809a007ddfd340ebc0d500db436cd038e3d3b4aaf0fd8bcf36e3a1cee4442c5d894679f5cdc7cef5a90c04534f937121d6cc9e3857

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.stockmeieir.com
  • Port:
    587
  • Username:
    m.melendez@stockmeieir.com
  • Password:
    aU6sb@#1%Efh

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winlogon.exe
    "C:\Users\Admin\AppData\Local\Temp\winlogon.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UlhpAjSuVoTa.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:820
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UlhpAjSuVoTa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp722E.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3056
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1344

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp722E.tmp
    MD5

    8733ec86a2de0a85acb180a8fe791d09

    SHA1

    7bd167fbf59d784ac42508934524b3a3872aba7b

    SHA256

    24ce2c2ab6a0e079dc9bd67885d7c53c1adcfb296b6ba480eeb4b9f8a7f00413

    SHA512

    33ff0c79c607076ebf883d90414c998cde19982d7dd0588bca97778a773f52e95864352b8334d76a774de78c1478d26b9b46d23edac10ba136ee0697c8c07ce0

  • memory/820-134-0x0000000005030000-0x0000000005031000-memory.dmp
    Filesize

    4KB

  • memory/820-155-0x0000000009820000-0x0000000009853000-memory.dmp
    Filesize

    204KB

  • memory/820-145-0x0000000008630000-0x0000000008631000-memory.dmp
    Filesize

    4KB

  • memory/820-143-0x0000000008160000-0x0000000008161000-memory.dmp
    Filesize

    4KB

  • memory/820-168-0x000000007EAE0000-0x000000007EAE1000-memory.dmp
    Filesize

    4KB

  • memory/820-135-0x0000000005032000-0x0000000005033000-memory.dmp
    Filesize

    4KB

  • memory/820-169-0x0000000005033000-0x0000000005034000-memory.dmp
    Filesize

    4KB

  • memory/820-167-0x0000000009B50000-0x0000000009B51000-memory.dmp
    Filesize

    4KB

  • memory/820-125-0x0000000000000000-mapping.dmp
  • memory/820-162-0x00000000097E0000-0x00000000097E1000-memory.dmp
    Filesize

    4KB

  • memory/820-127-0x0000000004E10000-0x0000000004E11000-memory.dmp
    Filesize

    4KB

  • memory/820-128-0x0000000004E10000-0x0000000004E11000-memory.dmp
    Filesize

    4KB

  • memory/820-129-0x0000000004F40000-0x0000000004F41000-memory.dmp
    Filesize

    4KB

  • memory/820-146-0x0000000008BC0000-0x0000000008BC1000-memory.dmp
    Filesize

    4KB

  • memory/820-131-0x0000000007A50000-0x0000000007A51000-memory.dmp
    Filesize

    4KB

  • memory/820-142-0x00000000080F0000-0x00000000080F1000-memory.dmp
    Filesize

    4KB

  • memory/820-170-0x0000000009D60000-0x0000000009D61000-memory.dmp
    Filesize

    4KB

  • memory/820-148-0x0000000004E10000-0x0000000004E11000-memory.dmp
    Filesize

    4KB

  • memory/820-147-0x0000000008A80000-0x0000000008A81000-memory.dmp
    Filesize

    4KB

  • memory/820-140-0x00000000079A0000-0x00000000079A1000-memory.dmp
    Filesize

    4KB

  • memory/820-141-0x0000000008080000-0x0000000008081000-memory.dmp
    Filesize

    4KB

  • memory/1344-132-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1344-133-0x00000000004374EE-mapping.dmp
  • memory/1344-144-0x0000000004F70000-0x000000000546E000-memory.dmp
    Filesize

    5.0MB

  • memory/1344-388-0x0000000004F70000-0x000000000546E000-memory.dmp
    Filesize

    5.0MB

  • memory/3056-126-0x0000000000000000-mapping.dmp
  • memory/3496-122-0x0000000005010000-0x0000000005011000-memory.dmp
    Filesize

    4KB

  • memory/3496-120-0x0000000004BA0000-0x0000000004BA1000-memory.dmp
    Filesize

    4KB

  • memory/3496-117-0x0000000005100000-0x0000000005101000-memory.dmp
    Filesize

    4KB

  • memory/3496-118-0x0000000004C00000-0x0000000004C01000-memory.dmp
    Filesize

    4KB

  • memory/3496-124-0x0000000005A40000-0x0000000005AA9000-memory.dmp
    Filesize

    420KB

  • memory/3496-123-0x00000000058A0000-0x00000000058A1000-memory.dmp
    Filesize

    4KB

  • memory/3496-121-0x0000000004E40000-0x0000000004E48000-memory.dmp
    Filesize

    32KB

  • memory/3496-115-0x00000000002F0000-0x00000000002F1000-memory.dmp
    Filesize

    4KB

  • memory/3496-119-0x0000000004B00000-0x0000000004B92000-memory.dmp
    Filesize

    584KB