Analysis
-
max time kernel
90s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Document BL,INV and packing list.jpg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Shipment Document BL,INV and packing list.jpg.exe
Resource
win10v2004-20220901-en
General
-
Target
Shipment Document BL,INV and packing list.jpg.exe
-
Size
1.4MB
-
MD5
90f0bfbc6e2c24e61844856d16501a62
-
SHA1
dbcd2c75ab8c79f016670042df9183194785e0f9
-
SHA256
d82ddcb3ef97d2cca2321a4e1d89add909d9aaeaf2166b28cc8f64f3603b93a4
-
SHA512
75537e91db75c9c6ddd0fa1d9b8a63589a8bb99e8f942cb1241e91f8642098b875e8f15a14fc17a61a4a3eba5c641f36a394163297fae1a7f07f091620a28a42
-
SSDEEP
12288:esmyfFaEXq1eKE8wbji5ymzB2L6nWZQzjFeM6DJOjB9sTTHyvJ1dFg:pja9zB2L6nYQb6VObnr
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5343531330:AAGJBRXMXstUjUCkHWRQxeLoip9bwkKXmx8/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Shipment Document BL,INV and packing list.jpg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Document BL,INV and packing list.jpg.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Document BL,INV and packing list.jpg.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Document BL,INV and packing list.jpg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hussan = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\hussan.exe\"" Shipment Document BL,INV and packing list.jpg.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 api.ipify.org 40 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4236 powershell.exe 4236 powershell.exe 4524 Shipment Document BL,INV and packing list.jpg.exe 4524 Shipment Document BL,INV and packing list.jpg.exe 4524 Shipment Document BL,INV and packing list.jpg.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4236 powershell.exe Token: SeDebugPrivilege 2128 Shipment Document BL,INV and packing list.jpg.exe Token: SeDebugPrivilege 4524 Shipment Document BL,INV and packing list.jpg.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2128 wrote to memory of 4236 2128 Shipment Document BL,INV and packing list.jpg.exe 84 PID 2128 wrote to memory of 4236 2128 Shipment Document BL,INV and packing list.jpg.exe 84 PID 2128 wrote to memory of 4236 2128 Shipment Document BL,INV and packing list.jpg.exe 84 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 PID 2128 wrote to memory of 4524 2128 Shipment Document BL,INV and packing list.jpg.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Document BL,INV and packing list.jpg.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Document BL,INV and packing list.jpg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipment Document BL,INV and packing list.jpg.exe"C:\Users\Admin\AppData\Local\Temp\Shipment Document BL,INV and packing list.jpg.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\Shipment Document BL,INV and packing list.jpg.exe"C:\Users\Admin\AppData\Local\Temp\Shipment Document BL,INV and packing list.jpg.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Shipment Document BL,INV and packing list.jpg.exe.log
Filesize1KB
MD57e88081fcf716d85992bb3af3d9b6454
SHA12153780fbc71061b0102a7a7b665349e1013e250
SHA2565ffb4a3ea94a6a53c4f88e2191c6fec5fd8a7336e367aa113fe8c12631e0c4d2
SHA512ec606e14367ae221c04f213a61a6f797034495121198e4788e3afa4aa8db67bf59c5c5210a56afae5557158e8923b013b371b84c7d64303618c5b4c57a2224f7