Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    03-12-2021 15:16

General

  • Target

    DOCUMENT No. 4 & 5.exe

  • Size

    543KB

  • MD5

    83600f4b738720bfdd0f0a65d3398a79

  • SHA1

    ac1e74674eee3c0249c9bedfe041c90bd83327f5

  • SHA256

    c5f0b11cba973a4b098ef858ae755ef0e6353296ae998503eafb3a67fa21d1c0

  • SHA512

    35e767959b6deb51323414f1875aac16d1b68d79c87eb834fd0bfd6ca4d5165d35dbc7b6dab2b57cff1d70fde0fd6d6fb9878983b95cd21961378b2a5511502e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.scahe.co.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    scaheavy@12345

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe
    "C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe
      "C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe"
      2⤵
      • Drops file in Drivers directory
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1280

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsiF789.tmp\gdhcrgo.dll
    MD5

    a0d89d8edb86db24831ea85b7a3c5dbb

    SHA1

    359fe728bef83a0ea27458ad4411c2e147a1069f

    SHA256

    8c6b8c843d3a4959c502d55be98e60729480401e20a7515e779fbf78edfc79a7

    SHA512

    1de3200778c3606c4ad15ae1f1137842e0aa6f268eac24cb3c7821e9f4cccddbf08a2157430cf8a64a8567c8c16a01b5a24ea4b66d8e6e289e5531a121e987ec

  • memory/472-55-0x0000000074F21000-0x0000000074F23000-memory.dmp
    Filesize

    8KB

  • memory/1280-57-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1280-58-0x000000000040188B-mapping.dmp
  • memory/1280-60-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1280-61-0x0000000001F10000-0x0000000001F47000-memory.dmp
    Filesize

    220KB

  • memory/1280-64-0x00000000044F2000-0x00000000044F3000-memory.dmp
    Filesize

    4KB

  • memory/1280-63-0x00000000044F1000-0x00000000044F2000-memory.dmp
    Filesize

    4KB

  • memory/1280-65-0x00000000044F3000-0x00000000044F4000-memory.dmp
    Filesize

    4KB

  • memory/1280-66-0x00000000044F4000-0x00000000044F5000-memory.dmp
    Filesize

    4KB