Analysis

  • max time kernel
    118s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 12:40

General

  • Target

    48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe

  • Size

    719KB

  • MD5

    1a3a0c8bdf1d6db781adc5d730668495

  • SHA1

    5a41a47ffbac1f5fb03520dd79dea0a1de22b00d

  • SHA256

    48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0

  • SHA512

    47f19026d24d1a7da6ab551f565bf3d2109109b23723228edfcb8a782407f0cdc1444abcc4651fdd62b1d51293469deca68f075a7eaa59ac5dde945abb9d7693

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe
    "C:\Users\Admin\AppData\Local\Temp\48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jNBsvPueSVkAdn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp51E8.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1580
    • C:\Users\Admin\AppData\Local\Temp\48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp51E8.tmp

    Filesize

    1KB

    MD5

    6993b4f7d4bf9e0876bf0f011d983279

    SHA1

    847986037eb345f87199f6c1cee973e23a1b107d

    SHA256

    0cc13038a1845e71cfeb26c46a63c53497ee6980c21112fdafb05b10f0739773

    SHA512

    5a7157cae9020f41944aaa2872927a209847d83c033c8be071a9aeb3bedd885e4e928c5d3a216b6e06b49e95537964f1ff069f1cbf8b31c5aa40b512a2886320

  • memory/240-64-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/240-59-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/240-60-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/240-62-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/240-63-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/240-67-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/240-69-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2000-56-0x0000000000920000-0x00000000009AE000-memory.dmp

    Filesize

    568KB

  • memory/2000-55-0x0000000000A30000-0x0000000000A4C000-memory.dmp

    Filesize

    112KB

  • memory/2000-54-0x0000000001170000-0x000000000122A000-memory.dmp

    Filesize

    744KB