Analysis

  • max time kernel
    137s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    04-12-2021 06:00

General

  • Target

    Pago completo____________________________________________________________________.bat.exe

  • Size

    602KB

  • MD5

    534bc2255d22103f83e23dbedad55b81

  • SHA1

    b6765b159f732befe3834a2e8d253bc15a6397e6

  • SHA256

    18e4b85fb1d19d14068cf9e1e09b964645aec58197471b35c0b3a7ad8fd4d219

  • SHA512

    97bce47399ac42b87bf1c6641830e0cdb6ce16cfe7255d1a22cdbbdcfe69020e3966cb045f9c33a0bcf47d8066f94a71607b5ceb3ef062907c040dfd731b7453

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dcodjdh@china3

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pago completo____________________________________________________________________.bat.exe
    "C:\Users\Admin\AppData\Local\Temp\Pago completo____________________________________________________________________.bat.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3384
    • C:\Users\Admin\AppData\Local\Temp\Pago completo____________________________________________________________________.bat.exe
      "C:\Users\Admin\AppData\Local\Temp\Pago completo____________________________________________________________________.bat.exe"
      2⤵
      • Drops file in Drivers directory
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Pago completo____________________________________________________________________.bat.exe.log

    MD5

    f1181bc4bdff57024c4121f645548332

    SHA1

    d431ee3a3a5afcae2c4537b1d445054a0a95f6e6

    SHA256

    f1a7e138b25d0cb24bb4b23bd781b0dd357afd49d45e19ffa44cdb80170336ad

    SHA512

    cf8059f289bcb4f33e82a2c4851fade486bd449793a39718d49bc357efd09689150aedd277c5ebcf79b5ebb4bbe36f0cbb72510a50398bee804ffd9c889604e3

  • memory/420-125-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/420-137-0x0000000005000000-0x00000000054FE000-memory.dmp

    Filesize

    5.0MB

  • memory/420-134-0x0000000005C60000-0x0000000005C61000-memory.dmp

    Filesize

    4KB

  • memory/420-133-0x00000000051B0000-0x00000000051B1000-memory.dmp

    Filesize

    4KB

  • memory/420-132-0x0000000005000000-0x00000000054FE000-memory.dmp

    Filesize

    5.0MB

  • memory/420-126-0x00000000004376EE-mapping.dmp

  • memory/3384-120-0x0000000007440000-0x0000000007441000-memory.dmp

    Filesize

    4KB

  • memory/3384-124-0x0000000009C50000-0x0000000009CB9000-memory.dmp

    Filesize

    420KB

  • memory/3384-123-0x0000000009AB0000-0x0000000009AB1000-memory.dmp

    Filesize

    4KB

  • memory/3384-122-0x0000000009880000-0x0000000009881000-memory.dmp

    Filesize

    4KB

  • memory/3384-121-0x00000000076B0000-0x00000000076B8000-memory.dmp

    Filesize

    32KB

  • memory/3384-115-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/3384-119-0x0000000007370000-0x000000000786E000-memory.dmp

    Filesize

    5.0MB

  • memory/3384-118-0x0000000007450000-0x0000000007451000-memory.dmp

    Filesize

    4KB

  • memory/3384-117-0x0000000007870000-0x0000000007871000-memory.dmp

    Filesize

    4KB