Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:50
Static task
static1
Behavioral task
behavioral1
Sample
9758a1ed3f47022f27a6c1a4490d81a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9758a1ed3f47022f27a6c1a4490d81a1.exe
Resource
win10v2004-20220812-en
General
-
Target
9758a1ed3f47022f27a6c1a4490d81a1.exe
-
Size
844KB
-
MD5
9758a1ed3f47022f27a6c1a4490d81a1
-
SHA1
6ac703af0a201398cc137ac9f06e18a1dbc153d2
-
SHA256
cf245d962d603ab9dca4b815963b2a21c8e13fc447d58f3d22a21d9841c46f03
-
SHA512
0b5808ed7a101eeaaecb8c91c0032f79020aae919fe67a053b8a1ce9c432409fb14abc9326fdcb8d6a4ecc1e9d221b5f0f8446a839435a0429d6f5bf7e42d7ee
-
SSDEEP
12288:OAJYsZ1DX/VDJtV7TZ0k13kc38MPWd2p34dpDd7P5XAfJ0:3JYknZV8My2poPx75k0
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.apexfinanceuk.com - Port:
587 - Username:
[email protected] - Password:
2OQWAS!z@H!!dTQ
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 9758a1ed3f47022f27a6c1a4490d81a1.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 9758a1ed3f47022f27a6c1a4490d81a1.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 9758a1ed3f47022f27a6c1a4490d81a1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exedescription pid process target process PID 2252 set thread context of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exepid process 4156 9758a1ed3f47022f27a6c1a4490d81a1.exe 4156 9758a1ed3f47022f27a6c1a4490d81a1.exe 4156 9758a1ed3f47022f27a6c1a4490d81a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exedescription pid process Token: SeDebugPrivilege 4156 9758a1ed3f47022f27a6c1a4490d81a1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exepid process 4156 9758a1ed3f47022f27a6c1a4490d81a1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exedescription pid process target process PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe PID 2252 wrote to memory of 4156 2252 9758a1ed3f47022f27a6c1a4490d81a1.exe 9758a1ed3f47022f27a6c1a4490d81a1.exe -
outlook_office_path 1 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 9758a1ed3f47022f27a6c1a4490d81a1.exe -
outlook_win_path 1 IoCs
Processes:
9758a1ed3f47022f27a6c1a4490d81a1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 9758a1ed3f47022f27a6c1a4490d81a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9758a1ed3f47022f27a6c1a4490d81a1.exe"C:\Users\Admin\AppData\Local\Temp\9758a1ed3f47022f27a6c1a4490d81a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9758a1ed3f47022f27a6c1a4490d81a1.exe"C:\Users\Admin\AppData\Local\Temp\9758a1ed3f47022f27a6c1a4490d81a1.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2252-132-0x00000000002C0000-0x000000000039A000-memory.dmpFilesize
872KB
-
memory/2252-133-0x00000000053A0000-0x0000000005944000-memory.dmpFilesize
5.6MB
-
memory/2252-134-0x0000000004D20000-0x0000000004DB2000-memory.dmpFilesize
584KB
-
memory/2252-135-0x0000000004D10000-0x0000000004D1A000-memory.dmpFilesize
40KB
-
memory/2252-136-0x00000000087F0000-0x000000000888C000-memory.dmpFilesize
624KB
-
memory/4156-137-0x0000000000000000-mapping.dmp
-
memory/4156-138-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4156-139-0x0000000005C60000-0x0000000005CC6000-memory.dmpFilesize
408KB
-
memory/4156-140-0x0000000005F70000-0x0000000005FC0000-memory.dmpFilesize
320KB