Analysis

  • max time kernel
    91s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2022 20:07

General

  • Target

    7931dd740a52c27c207da8b3d321fea4.exe

  • Size

    2.3MB

  • MD5

    7931dd740a52c27c207da8b3d321fea4

  • SHA1

    580b2f75f17b47cbd7fa13eaad2086d55ea1f94e

  • SHA256

    85a19581e91e88724309d4435138a9a4281b17e2a28ed851eea52adc4183a8ef

  • SHA512

    052999e70f2d93c8a7987a963d49d59d334d7e29f646ce395717e6532cdc6044cfc4b35a8ce075d6e44fc3f43259c5c7ea69717c7f1b5ab32c31066e4483ff2b

  • SSDEEP

    49152:Dsd1ULL/ivao9Z4X2hglYgaGtA1eb7Nx//vRJJcYGIjweBK:DsdqL/aZgvlTFAGNR3mYGkK

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

rze6.sytes.net:8000

Mutex

0aeffa29-f3e3-4c27-b5c4-5ee7e27a451f

Attributes
  • activate_away_mode

    true

  • backup_connection_host

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2022-07-19T10:27:50.574421636Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    8000

  • default_group

    OCT

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    0aeffa29-f3e3-4c27-b5c4-5ee7e27a451f

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    rze6.sytes.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Extracted

Family

agenttesla

C2

http://195.178.120.72/3ip/inc/523ecb38582a9c.php

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7931dd740a52c27c207da8b3d321fea4.exe
    "C:\Users\Admin\AppData\Local\Temp\7931dd740a52c27c207da8b3d321fea4.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\AppData\Local\temp\7_102\tin.exe
      "C:\Users\Admin\AppData\Local\temp\7_102\tin.exe" Paul E. Patton (born May 26, 1937) is an American politician who served as the 59th governor of Kentucky from 1995 to 2003.
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\6_52\dxqohfcd.vbe"
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Local\Temp\6_52\ronagjt.exe
          "C:\Users\Admin\AppData\Local\Temp\6_52\ronagjt.exe" dfaecaqw.bem
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3816
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3396
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\7_102\bebs.vbe"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\7_102\ljhqvm.exe
        "C:\Users\Admin\AppData\Local\Temp\7_102\ljhqvm.exe" qdrgduavht.vdo
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:4288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6_52\dfaecaqw.bem

    Filesize

    96.5MB

    MD5

    5705ddc564c9933bbe839704f3b95f5f

    SHA1

    2ff734b5fc48fd6947d47255b47946503a6c810a

    SHA256

    2c04510a8103b6097652d1b41fbfdb6e584bef77cc5c26db015ce7274ca1a243

    SHA512

    72ca4a5eaa22958c63d124df55b6f145b9473493970d25df2d7b5e5a2a38716dbc9d0ca2496d6a662e6497b7c32fcc6eba5dda72aa552ae7190a524b3a80df59

  • C:\Users\Admin\AppData\Local\Temp\6_52\hhvdevjbln.bin

    Filesize

    58KB

    MD5

    7e8dc9d2243b6b560ec25de2f5d32f73

    SHA1

    cc4c8f1a0532905063d0611808b1c2361bfa6cb0

    SHA256

    0503fd2daa4e0bec05918498100da1444026be8b02afa7410e89a2ff718e9af5

    SHA512

    5b2e8b2d4c35f868750f3b6dc428132fcf9e194aff6453802c56316645fe4f94d54d982837aa76f4cc547272870dbd9f43f5e8fd8560bc1613a6397d786294bf

  • C:\Users\Admin\AppData\Local\Temp\6_52\ronagjt.exe

    Filesize

    1.1MB

    MD5

    523ca3f2ebf61412d374b045e4e6521f

    SHA1

    46082730d8d0f7e25f6851c2bface6b322b299c7

    SHA256

    280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d

    SHA512

    6d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866

  • C:\Users\Admin\AppData\Local\Temp\6_52\ronagjt.exe

    Filesize

    1.1MB

    MD5

    523ca3f2ebf61412d374b045e4e6521f

    SHA1

    46082730d8d0f7e25f6851c2bface6b322b299c7

    SHA256

    280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d

    SHA512

    6d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866

  • C:\Users\Admin\AppData\Local\Temp\6_52\uxbr.wfu

    Filesize

    405KB

    MD5

    b98d2fe49114ff6a0418da4c8da121c0

    SHA1

    6f341fa972371274542f1fa6e4ed4423b85a5892

    SHA256

    f6fac24f5d442d583a64cd5f8f645bccf8f5f51716987711f7ad43d1607be480

    SHA512

    42ff786a73f89fe44d0a1c1b4cc347033ddff53baa55094463e17ecb0485e4059dc39ac018745c41f2e42a9cc888a02824c5e5d0092b25420b6481d4649ec331

  • C:\Users\Admin\AppData\Local\Temp\7_102\gtwmquijl.foe

    Filesize

    418KB

    MD5

    cfbd0bb867c1a8c57148b3cf66bb9f2a

    SHA1

    9a21acd898eca412174a9d6b65391dc5ddbc9ce0

    SHA256

    7d3becd82b5648536be10e3c0f0a75eda1289e1d5f6064124fc8ce57bb546eaf

    SHA512

    96a2d55370cab3fdb2787396086f57f078304035774919a83bf1c01d9fa9e6bf8d2a2a1142be780b99c81f5d078ce927a8b4d7429f41dffcf2361bff28a55746

  • C:\Users\Admin\AppData\Local\Temp\7_102\ljhqvm.exe

    Filesize

    1.1MB

    MD5

    523ca3f2ebf61412d374b045e4e6521f

    SHA1

    46082730d8d0f7e25f6851c2bface6b322b299c7

    SHA256

    280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d

    SHA512

    6d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866

  • C:\Users\Admin\AppData\Local\Temp\7_102\ljhqvm.exe

    Filesize

    1.1MB

    MD5

    523ca3f2ebf61412d374b045e4e6521f

    SHA1

    46082730d8d0f7e25f6851c2bface6b322b299c7

    SHA256

    280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d

    SHA512

    6d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866

  • C:\Users\Admin\AppData\Local\Temp\7_102\qdrgduavht.vdo

    Filesize

    218.5MB

    MD5

    ee6465b941302be6fe283032c365b45d

    SHA1

    f2064852fac87ad591095315cdf788deba6ccb92

    SHA256

    e527d4c13281d23ace0be18dc08a03f7b367f3f357ce66ccf8eac02d87e934ea

    SHA512

    5faa273d8029d18000d0be32723be264ef79941eb2d1b01bf90c1f081093f38340f8918aa6465fc15e8227a005fa745075a9a59f4d80d925749c60d73a1eb21a

  • C:\Users\Admin\AppData\Local\Temp\7_102\tin.exe

    Filesize

    1.1MB

    MD5

    91f78783085088dcb9465c1134b88db9

    SHA1

    a8e99576338bc1f8e875c6708ecdc711f95ec6ad

    SHA256

    2d807a2ff13bd39ce1c5737373e6a4350bf2a01530da5f8c0d9ab6f3f839ef59

    SHA512

    e8a2114dc402906792d394143738b8cbc97e00d4b48fd70c4a21ad7ceb4f51a6380987bcb5068f373cd27fecbc5ff3620c831b9843d0aeb09a7cea19fa20cd46

  • C:\Users\Admin\AppData\Local\Temp\7_102\xemjkdmxvi.log

    Filesize

    51KB

    MD5

    8b3e514529ed4edf9bb61ab0d79e649f

    SHA1

    d55a6b16a7931afd6b1f4e627fc6a1dd122e2103

    SHA256

    c78e26a29a8f00742228c21f7dce5114188cce9767f41fd1a552bd730c62e9a7

    SHA512

    e95d65902617ca032564f51243cbb206fe437b27d281774a6a0260204d4014a7a05e42276a5de1c71d03bf432f86cbc254fbb4ee19aefff8b29f6d952bc43440

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    9d352bc46709f0cb5ec974633a0c3c94

    SHA1

    1969771b2f022f9a86d77ac4d4d239becdf08d07

    SHA256

    2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

    SHA512

    13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

  • C:\Users\Admin\AppData\Local\temp\6_52\dxqohfcd.vbe

    Filesize

    25KB

    MD5

    68749046aa13cbbd11aee0fe7bc4ea4f

    SHA1

    1898f175b78d5cb4d35163bf44147de9742693a3

    SHA256

    ac3c913e82ef8d5e82ccc246609cc2ab5a06b8a7331535db4d49874580da38fe

    SHA512

    9ac2cac9be2fabe80f470ae4987fac88cc05848db549bd1b91ebc54e6676840d39d7b88d8bfdc03cee278147723e0642a04ec4f804a71da36af42ebb381ade53

  • C:\Users\Admin\AppData\Local\temp\7_102\bebs.vbe

    Filesize

    23KB

    MD5

    a678c50f4962535591686461755e9088

    SHA1

    6dab331334c8f201f38a122a9f9506c345e6ea11

    SHA256

    07bf618016a6faa9b58ca4ac9e16874fc05a381af8dd225347cd26fafd05d079

    SHA512

    cb680a98febc79ea91bff890c8e8ea14d0dcbbdadb18a0d47a933e777ea2ad27da3375aebb8b0ceaf2858222ef45a6397a125b3feb68b7ddf20025035883f84f

  • C:\Users\Admin\AppData\Local\temp\7_102\tin.exe

    Filesize

    1.1MB

    MD5

    91f78783085088dcb9465c1134b88db9

    SHA1

    a8e99576338bc1f8e875c6708ecdc711f95ec6ad

    SHA256

    2d807a2ff13bd39ce1c5737373e6a4350bf2a01530da5f8c0d9ab6f3f839ef59

    SHA512

    e8a2114dc402906792d394143738b8cbc97e00d4b48fd70c4a21ad7ceb4f51a6380987bcb5068f373cd27fecbc5ff3620c831b9843d0aeb09a7cea19fa20cd46

  • memory/1256-138-0x0000000000000000-mapping.dmp

  • memory/2348-142-0x0000000000000000-mapping.dmp

  • memory/3396-153-0x0000000000B00000-0x0000000000B38000-memory.dmp

    Filesize

    224KB

  • memory/3396-149-0x0000000000B00000-0x0000000001063000-memory.dmp

    Filesize

    5.4MB

  • memory/3396-154-0x0000000005D90000-0x0000000006334000-memory.dmp

    Filesize

    5.6MB

  • memory/3396-155-0x00000000057E0000-0x0000000005872000-memory.dmp

    Filesize

    584KB

  • memory/3396-156-0x0000000005880000-0x000000000591C000-memory.dmp

    Filesize

    624KB

  • memory/3396-157-0x00000000057B0000-0x00000000057BA000-memory.dmp

    Filesize

    40KB

  • memory/3396-150-0x0000000000B1E792-mapping.dmp

  • memory/3816-141-0x0000000000000000-mapping.dmp

  • memory/4288-161-0x00000000006359CE-mapping.dmp

  • memory/4288-160-0x0000000000600000-0x0000000000C83000-memory.dmp

    Filesize

    6.5MB

  • memory/4288-163-0x0000000000600000-0x000000000063A000-memory.dmp

    Filesize

    232KB

  • memory/4288-164-0x0000000005E80000-0x0000000005EE6000-memory.dmp

    Filesize

    408KB

  • memory/4288-165-0x00000000064F0000-0x0000000006540000-memory.dmp

    Filesize

    320KB

  • memory/4880-132-0x0000000000000000-mapping.dmp

  • memory/5032-135-0x0000000000000000-mapping.dmp