Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 00:49

General

  • Target

    Swift_Confirmation_Copy_PDF.exe

  • Size

    635KB

  • MD5

    8f8997c46d2e2d5bacace89ddc5b98ea

  • SHA1

    42936ce414491a0bdf4363e028e9acc809904828

  • SHA256

    0e6d1760c730846071dff47ea51828caf0108d9dd72f472e0a29b7f06c880955

  • SHA512

    fba79b3893726c6160f3d8cde09daf562dba7f6fd7de20575ab21093cc4effa93cb8de5638db56e6fc9fdc9419320cae5ae5d993465b48d3bd0ab23107efaa20

  • SSDEEP

    12288:KP2ezBnLOkPRxliW1PjiZj5C23orXRU7uIjV8uqFgfjPe4lRvsc8ZR301P:y2exikPRrhGZjY24KNjuRWfFR

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1923344551:AAGJ9MeV4yHipzEdvvxVuepm8PFUNaCZez4/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AddJPyGJtsi.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4904
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AddJPyGJtsi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEF56.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:620
    • C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe"
      2⤵
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe"
        2⤵
          PID:3428
        • C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe
          "C:\Users\Admin\AppData\Local\Temp\Swift_Confirmation_Copy_PDF.exe"
          2⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:2912

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpEF56.tmp

        Filesize

        1KB

        MD5

        8bf0ac3557ac6a1a1aeea1873d7b41da

        SHA1

        b7ca8e957838820d22e094efc3dbfa5ccb076ea6

        SHA256

        bb5b7754fdda8f283881ada2ca68719abec7bc751eb44b6830b79f49a282c296

        SHA512

        789dc2ef51000c14e603324b5c671d05a33b449d39e5668d8e4888265cb42d88001ca283c0ce644372a94f9c54048b1eef76ff0cb3908a332b9987530d7321f7

      • memory/620-139-0x0000000000000000-mapping.dmp

      • memory/2912-146-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/2912-157-0x0000000006990000-0x00000000069E0000-memory.dmp

        Filesize

        320KB

      • memory/2912-145-0x0000000000000000-mapping.dmp

      • memory/3428-144-0x0000000000000000-mapping.dmp

      • memory/4756-142-0x0000000000000000-mapping.dmp

      • memory/4876-135-0x0000000006FD0000-0x0000000006FDA000-memory.dmp

        Filesize

        40KB

      • memory/4876-136-0x000000000A960000-0x000000000A9FC000-memory.dmp

        Filesize

        624KB

      • memory/4876-137-0x000000000AB70000-0x000000000ABD6000-memory.dmp

        Filesize

        408KB

      • memory/4876-134-0x0000000007050000-0x00000000070E2000-memory.dmp

        Filesize

        584KB

      • memory/4876-133-0x0000000007560000-0x0000000007B04000-memory.dmp

        Filesize

        5.6MB

      • memory/4876-132-0x00000000000B0000-0x0000000000156000-memory.dmp

        Filesize

        664KB

      • memory/4904-147-0x0000000006020000-0x0000000006042000-memory.dmp

        Filesize

        136KB

      • memory/4904-152-0x0000000006D50000-0x0000000006D6E000-memory.dmp

        Filesize

        120KB

      • memory/4904-141-0x00000000051F0000-0x0000000005226000-memory.dmp

        Filesize

        216KB

      • memory/4904-148-0x00000000060C0000-0x0000000006126000-memory.dmp

        Filesize

        408KB

      • memory/4904-149-0x00000000063C0000-0x00000000063DE000-memory.dmp

        Filesize

        120KB

      • memory/4904-150-0x0000000007950000-0x0000000007982000-memory.dmp

        Filesize

        200KB

      • memory/4904-151-0x00000000713B0000-0x00000000713FC000-memory.dmp

        Filesize

        304KB

      • memory/4904-143-0x00000000058C0000-0x0000000005EE8000-memory.dmp

        Filesize

        6.2MB

      • memory/4904-153-0x00000000080F0000-0x000000000876A000-memory.dmp

        Filesize

        6.5MB

      • memory/4904-154-0x0000000007AA0000-0x0000000007ABA000-memory.dmp

        Filesize

        104KB

      • memory/4904-155-0x0000000007B10000-0x0000000007B1A000-memory.dmp

        Filesize

        40KB

      • memory/4904-156-0x0000000007D20000-0x0000000007DB6000-memory.dmp

        Filesize

        600KB

      • memory/4904-138-0x0000000000000000-mapping.dmp

      • memory/4904-158-0x0000000007CD0000-0x0000000007CDE000-memory.dmp

        Filesize

        56KB

      • memory/4904-159-0x0000000007DE0000-0x0000000007DFA000-memory.dmp

        Filesize

        104KB

      • memory/4904-160-0x0000000007DC0000-0x0000000007DC8000-memory.dmp

        Filesize

        32KB