Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 11:58

General

  • Target

    MAERSK KLEVEN V.949.exe

  • Size

    3.9MB

  • MD5

    21eda5c3a9b012e0ae18f446da1b9eeb

  • SHA1

    0b01392f53c0fe65952495ba14af70420d2c5853

  • SHA256

    f1f8cbfc6921ce73c2c3668b2fded2a1bdb3cf8d5434f23090840115188fd7b9

  • SHA512

    74ae6555b9329bc549bd686f9d861b2d09bf0030b07a1289801bef239751c770fcb3ef729e6bcf724f32a6869893bb119480d3680e78b6be5bccc770bf517c18

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • AgentTesla Payload 7 IoCs
  • Drops startup file 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MAERSK KLEVEN V.949.exe
    "C:\Users\Admin\AppData\Local\Temp\MAERSK KLEVEN V.949.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Windows security modification
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:1736

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

2
T1089

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-57-0x0000000000000000-mapping.dmp
  • memory/960-59-0x000000006FF10000-0x00000000704BB000-memory.dmp
    Filesize

    5.7MB

  • memory/1108-54-0x0000000000F30000-0x0000000001324000-memory.dmp
    Filesize

    4.0MB

  • memory/1108-55-0x00000000009C0000-0x0000000000A2C000-memory.dmp
    Filesize

    432KB

  • memory/1108-56-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
    Filesize

    8KB

  • memory/1108-60-0x0000000000AB0000-0x0000000000AFA000-memory.dmp
    Filesize

    296KB

  • memory/1736-61-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB

  • memory/1736-62-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB

  • memory/1736-64-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB

  • memory/1736-65-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB

  • memory/1736-66-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB

  • memory/1736-67-0x0000000000445C2E-mapping.dmp
  • memory/1736-69-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB

  • memory/1736-71-0x0000000000400000-0x000000000044A000-memory.dmp
    Filesize

    296KB