Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    03-12-2021 15:16

General

  • Target

    DOCUMENT No. 4 & 5.exe

  • Size

    543KB

  • MD5

    83600f4b738720bfdd0f0a65d3398a79

  • SHA1

    ac1e74674eee3c0249c9bedfe041c90bd83327f5

  • SHA256

    c5f0b11cba973a4b098ef858ae755ef0e6353296ae998503eafb3a67fa21d1c0

  • SHA512

    35e767959b6deb51323414f1875aac16d1b68d79c87eb834fd0bfd6ca4d5165d35dbc7b6dab2b57cff1d70fde0fd6d6fb9878983b95cd21961378b2a5511502e

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.scahe.co.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    scaheavy@12345

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe
    "C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe
      "C:\Users\Admin\AppData\Local\Temp\DOCUMENT No. 4 & 5.exe"
      2⤵
      • Drops file in Drivers directory
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4344

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsmA23D.tmp\gdhcrgo.dll
    MD5

    a0d89d8edb86db24831ea85b7a3c5dbb

    SHA1

    359fe728bef83a0ea27458ad4411c2e147a1069f

    SHA256

    8c6b8c843d3a4959c502d55be98e60729480401e20a7515e779fbf78edfc79a7

    SHA512

    1de3200778c3606c4ad15ae1f1137842e0aa6f268eac24cb3c7821e9f4cccddbf08a2157430cf8a64a8567c8c16a01b5a24ea4b66d8e6e289e5531a121e987ec

  • memory/4344-119-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/4344-120-0x000000000040188B-mapping.dmp
  • memory/4344-121-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/4344-122-0x00000000047B0000-0x00000000047E7000-memory.dmp
    Filesize

    220KB

  • memory/4344-124-0x0000000004910000-0x0000000004911000-memory.dmp
    Filesize

    4KB

  • memory/4344-125-0x0000000004F40000-0x0000000004F41000-memory.dmp
    Filesize

    4KB

  • memory/4344-127-0x0000000004902000-0x0000000004903000-memory.dmp
    Filesize

    4KB

  • memory/4344-126-0x0000000004900000-0x0000000004901000-memory.dmp
    Filesize

    4KB

  • memory/4344-128-0x0000000004903000-0x0000000004904000-memory.dmp
    Filesize

    4KB

  • memory/4344-129-0x0000000004904000-0x0000000004905000-memory.dmp
    Filesize

    4KB

  • memory/4344-130-0x00000000057B0000-0x00000000057B1000-memory.dmp
    Filesize

    4KB

  • memory/4344-131-0x00000000057E0000-0x00000000057E1000-memory.dmp
    Filesize

    4KB

  • memory/4344-132-0x0000000005B90000-0x0000000005B91000-memory.dmp
    Filesize

    4KB

  • memory/4344-133-0x00000000008B0000-0x00000000008B1000-memory.dmp
    Filesize

    4KB