Analysis

  • max time kernel
    109s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/10/2022, 01:16

General

  • Target

    SecuriteInfo.com.Trojan.NSISX.Spy.Gen.24.15673.exe

  • Size

    478KB

  • MD5

    ab954cd6874d385822c5cbe6f24a198b

  • SHA1

    4684bfb8b2384cdd1b45c21a2023d8749e08a7bf

  • SHA256

    8f2fccdb63062f6aae9189cb8fb4971e118dfa10fa07d9aa726f5ae089b058ac

  • SHA512

    29cc375d28ad2562f4e56136e94426e5c86d78b30a92eac2286c7b8b7bc82753a6005972c78b0119647852b85541496b73b9297d5e9deff75c69f390cd148c5c

  • SSDEEP

    6144:ZweEVJSSiB/V8oqboYMxmnXYfr5G1GjmxOxZx3dqnJyTiOnlFifSlkdhOmdO1cS2:moqbNM8ITfdxXxFifx5O1Ux

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.360consultancyco.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @360consultancyco.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.24.15673.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.24.15673.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\asuqk.exe
      "C:\Users\Admin\AppData\Local\Temp\asuqk.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Users\Admin\AppData\Local\Temp\asuqk.exe
        "C:\Users\Admin\AppData\Local\Temp\asuqk.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:3372

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\asuqk.exe

          Filesize

          285KB

          MD5

          2d409b674590ad8d3f078b663e6e700c

          SHA1

          1f3b0fc277056411bdfeddd2ad33e753ecfc3558

          SHA256

          e813a613117bb5bcae8be176ea9116fe4884c558534a95fa6948fa949185a205

          SHA512

          9c7a18645d1a287abdf4b266bd7509c13303cc1609ad5071f001913a27d321b1b6e5a773718c60662f1a607a763c192c5f6c6166061c14e94c2c99b77bb6e137

        • C:\Users\Admin\AppData\Local\Temp\asuqk.exe

          Filesize

          285KB

          MD5

          2d409b674590ad8d3f078b663e6e700c

          SHA1

          1f3b0fc277056411bdfeddd2ad33e753ecfc3558

          SHA256

          e813a613117bb5bcae8be176ea9116fe4884c558534a95fa6948fa949185a205

          SHA512

          9c7a18645d1a287abdf4b266bd7509c13303cc1609ad5071f001913a27d321b1b6e5a773718c60662f1a607a763c192c5f6c6166061c14e94c2c99b77bb6e137

        • C:\Users\Admin\AppData\Local\Temp\asuqk.exe

          Filesize

          285KB

          MD5

          2d409b674590ad8d3f078b663e6e700c

          SHA1

          1f3b0fc277056411bdfeddd2ad33e753ecfc3558

          SHA256

          e813a613117bb5bcae8be176ea9116fe4884c558534a95fa6948fa949185a205

          SHA512

          9c7a18645d1a287abdf4b266bd7509c13303cc1609ad5071f001913a27d321b1b6e5a773718c60662f1a607a763c192c5f6c6166061c14e94c2c99b77bb6e137

        • C:\Users\Admin\AppData\Local\Temp\ritwjtodd.mv

          Filesize

          296KB

          MD5

          8de31a4f2b60885876fa6e7af62c8381

          SHA1

          e07b2341d85c38f59ebdaf51b65cb59242b19b86

          SHA256

          6f7f83d31abf05441d0f3698316a1bb3e34b6f70973348feb6a513cf5881a196

          SHA512

          6c2217c26b17b11c99e7345d241c1ee45d14cad897d090121c30eca52437dfd2a131eda31377e3404bfb5935073e12ebb09ff3fb13cd2776b0a9dce0501433c5

        • C:\Users\Admin\AppData\Local\Temp\ttfymtd.aic

          Filesize

          7KB

          MD5

          0215cb2be3cbb95f9122808326bd20fd

          SHA1

          6014753d3c06fd4c5b080c882f5acd0bbcc584ab

          SHA256

          585e02d34df08ed13921f57e4607e6f4504900e688b1bdae0d8a51bdb071804b

          SHA512

          9f53dc25549bc32559e845b517b3c444d5c8977d480f00a257b5953b2f9080f34a4262376bf4bcb76ccd3fec3ee4ddef5a965597bea0812e6f80dbf005bcc700

        • memory/3372-139-0x0000000004AC0000-0x0000000005064000-memory.dmp

          Filesize

          5.6MB

        • memory/3372-140-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/3372-141-0x0000000004A00000-0x0000000004A9C000-memory.dmp

          Filesize

          624KB

        • memory/3372-142-0x0000000005970000-0x00000000059D6000-memory.dmp

          Filesize

          408KB

        • memory/3372-143-0x0000000006250000-0x00000000062A0000-memory.dmp

          Filesize

          320KB

        • memory/3372-144-0x0000000006350000-0x00000000063E2000-memory.dmp

          Filesize

          584KB

        • memory/3372-145-0x0000000006710000-0x000000000671A000-memory.dmp

          Filesize

          40KB