Analysis

  • max time kernel
    147s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 15:15

General

  • Target

    IMG1128061077.exe

  • Size

    1.1MB

  • MD5

    c2f09ea4f30b3487f2361cf37732191f

  • SHA1

    a437c48bb287e6a5f86aa83165c3720b7431f6e7

  • SHA256

    d8d32922ddd6305ce4acc9c970e0a6d1c5866d344496be1620498ea035e9baf7

  • SHA512

    0dd4a64880ec25c0ddd45447cc3a5c55854cc68ecf873f76b7785328dfcc0c6e8511640b153badba15097f71257f0b68945fe64af43b70d2de48d74d24c3aa4a

  • SSDEEP

    24576:LAOcZXMu15QjEBv0BbJswG5cFu4KnmdMLFspB6Q7CqFHd:Nc5QjEBv0BWd5c4nmdMLE8Q77

Malware Config

Extracted

Family

agenttesla

C2

http://107.189.4.253/zipone/inc/10c5bcaaef047d.php

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG1128061077.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG1128061077.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\1_21\uxrdgkv.vbe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe
        "C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe" orwbi.ppt
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:1884
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1736
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                dw20.exe -x -s 424
                6⤵
                • Loads dropped DLL
                PID:1824
            • C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe
              "C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1396
              • C:\Windows\system32\cmd.exe
                "cmd.exe" /C schtasks /create /tn \oflgwXquKB /tr "C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1936
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /tn \oflgwXquKB /tr "C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                  7⤵
                  • Creates scheduled task(s)
                  PID:1664
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {0E829420-B397-4F29-B996-34F835189145} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe
        C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1284

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1_21\CCADCU~1.UFP
      Filesize

      486KB

      MD5

      e6fd501f926b13ffa3cf669b60f1bcac

      SHA1

      d0d935706fafb13b30a93172c87d000f9efaa593

      SHA256

      4e48e4af0178e6020e3d8465ca68a21f2958d4914157156302e8fc18b7d3cf89

      SHA512

      4145c0d33a4693bccb471a5efdc32958744b02772a94e0c1a7cedd308ec03ecd3a20615ba745098c5acbd4e5fd741ee510d22c5fd43c3c352e69bd6a6611087b

    • C:\Users\Admin\AppData\Local\Temp\1_21\dsjunpjk.bmp
      Filesize

      51KB

      MD5

      53f00d0add15553ead58f5ab8cc05d9f

      SHA1

      e550349e19a1823260b46b1b28d95be038d6c94a

      SHA256

      80ed3fce8096743b3bb9f205902749a416b5b0eb04e3ff2b9a97b828bfbeb494

      SHA512

      b150e3dcf66c7ed9dc61c5d9d48c1d301d762c1155ec6b2daabe07460278fe99d68b9658939245712106cc96f5b8e343b89d1a1b42953ed8846d47ec8334c77a

    • C:\Users\Admin\AppData\Local\Temp\1_21\orwbi.ppt
      Filesize

      113.8MB

      MD5

      94bb251b657d443554dd19416b71b584

      SHA1

      3f43434b318ef7582a20b13dad318f8ae614b7ad

      SHA256

      47b1ec135cfb4aea677b757edd41b537b92a1673d73ffe030251b72a86778286

      SHA512

      07eaad95344e6fa0d90a12eb3fff770d00147ebdce9801f2fadae23a76f2363482b530be209222650232b78e2bc8e206d847b64e5cb3c4b15061f5a87c1142a7

    • C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe
      Filesize

      925KB

      MD5

      682c72d316320e53161bce69a284ad3f

      SHA1

      8f79eb95055d5b7e055264cf38b94d9a4715572c

      SHA256

      d2e86eb3785286cb4820266f48a4aa1cc1d100f14e6acfa966ad4cbafae4c3c2

      SHA512

      e69cdf3ba5b43a88d2b1b8939cb8f781504206372e14622c092b18041a58a20b00d5f94e53b9866c0bc9235ec0e8a7b42aba0540eeb999294a5f0883d89ec91f

    • C:\Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe
      Filesize

      925KB

      MD5

      682c72d316320e53161bce69a284ad3f

      SHA1

      8f79eb95055d5b7e055264cf38b94d9a4715572c

      SHA256

      d2e86eb3785286cb4820266f48a4aa1cc1d100f14e6acfa966ad4cbafae4c3c2

      SHA512

      e69cdf3ba5b43a88d2b1b8939cb8f781504206372e14622c092b18041a58a20b00d5f94e53b9866c0bc9235ec0e8a7b42aba0540eeb999294a5f0883d89ec91f

    • C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe
      Filesize

      217KB

      MD5

      9b806fd0bd716d762711c47fdc887783

      SHA1

      2881e1da525b16b7c5b8178d7c6c12613983dbda

      SHA256

      475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7

      SHA512

      4d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c

    • C:\Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe
      Filesize

      217KB

      MD5

      9b806fd0bd716d762711c47fdc887783

      SHA1

      2881e1da525b16b7c5b8178d7c6c12613983dbda

      SHA256

      475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7

      SHA512

      4d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c

    • C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe
      Filesize

      8KB

      MD5

      fa22ef17a3b0bdb50020d4f27ad2feec

      SHA1

      634ecd4159890f24dce98a71b39a86ffdfd207bd

      SHA256

      81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

      SHA512

      fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

    • C:\Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe
      Filesize

      8KB

      MD5

      fa22ef17a3b0bdb50020d4f27ad2feec

      SHA1

      634ecd4159890f24dce98a71b39a86ffdfd207bd

      SHA256

      81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

      SHA512

      fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

    • C:\Users\Admin\AppData\Local\temp\1_21\uxrdgkv.vbe
      Filesize

      57KB

      MD5

      69efd9bd156c6defe5baf348b22f65cf

      SHA1

      e2ca6026fe7edd588b629e117739ec5072fdd10b

      SHA256

      baeaf19022f8298209969fc29462b848e38bad2a192c7ece72623afd79b5b6f2

      SHA512

      ccf6d3a1a10c190f848013a62b5c7050776b38b8fcf3eaeba98f15dec5285a05a64232448c6ff29f40153be4a32330868f0bdf3e593b8b48a2d63d9105aa86ff

    • C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe
      Filesize

      113.7MB

      MD5

      092f6d568d219ce1137789ea35321744

      SHA1

      1a47ac85d24cda61d1c8d598f321561767382d30

      SHA256

      89932fb86bb99f228e87eb61b4b145cfa9dafd60281c32a593a1f16a65ab6755

      SHA512

      e48f7ff9970c6ab7db1296621bb0332b2399105a13bf5f57b12ffffbea3c9f47f21222d81589214814f34d90afb304e0072d40be58463511d557de973a72ff7d

    • C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe
      Filesize

      114.9MB

      MD5

      20e682d7a749e497fe07fe49703ae779

      SHA1

      1270a9d27f516e787206e0fe8c6cc6ace9a721be

      SHA256

      b7c369db19386fbefc6f9e8bad0206718ca6e4dd213417fb52964e6f8500d97e

      SHA512

      2cdffabfae1d05c3610b807b7d8e55207ebb11977607ec1bc46b4273ebd584e30952a090e7f4e8582c8bc0bb755024475edc8db0182d76f4b4b4198b01dae8e6

    • \Users\Admin\AppData\Local\Temp\1_21\sndkbhuie.exe
      Filesize

      925KB

      MD5

      682c72d316320e53161bce69a284ad3f

      SHA1

      8f79eb95055d5b7e055264cf38b94d9a4715572c

      SHA256

      d2e86eb3785286cb4820266f48a4aa1cc1d100f14e6acfa966ad4cbafae4c3c2

      SHA512

      e69cdf3ba5b43a88d2b1b8939cb8f781504206372e14622c092b18041a58a20b00d5f94e53b9866c0bc9235ec0e8a7b42aba0540eeb999294a5f0883d89ec91f

    • \Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe
      Filesize

      217KB

      MD5

      9b806fd0bd716d762711c47fdc887783

      SHA1

      2881e1da525b16b7c5b8178d7c6c12613983dbda

      SHA256

      475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7

      SHA512

      4d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c

    • \Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe
      Filesize

      217KB

      MD5

      9b806fd0bd716d762711c47fdc887783

      SHA1

      2881e1da525b16b7c5b8178d7c6c12613983dbda

      SHA256

      475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7

      SHA512

      4d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c

    • \Users\Admin\AppData\Local\Temp\FB_79A3.tmp.exe
      Filesize

      217KB

      MD5

      9b806fd0bd716d762711c47fdc887783

      SHA1

      2881e1da525b16b7c5b8178d7c6c12613983dbda

      SHA256

      475caa3046685bdfb65538f4a4467b6ce115936736ffce85307da0fcaa55cec7

      SHA512

      4d898500cd2205fc7701556e22f284b2d47a482c152625123136881471962a0e646172a0364d55d74902f09dbcaf4699a901a7c81ccdd3e419796dab088e6f4c

    • \Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe
      Filesize

      8KB

      MD5

      fa22ef17a3b0bdb50020d4f27ad2feec

      SHA1

      634ecd4159890f24dce98a71b39a86ffdfd207bd

      SHA256

      81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

      SHA512

      fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

    • \Users\Admin\AppData\Local\Temp\FB_BC8D.tmp.exe
      Filesize

      8KB

      MD5

      fa22ef17a3b0bdb50020d4f27ad2feec

      SHA1

      634ecd4159890f24dce98a71b39a86ffdfd207bd

      SHA256

      81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

      SHA512

      fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

    • memory/964-55-0x0000000000000000-mapping.dmp
    • memory/1284-98-0x0000000000000000-mapping.dmp
    • memory/1284-100-0x0000000000800000-0x0000000000808000-memory.dmp
      Filesize

      32KB

    • memory/1396-90-0x0000000000070000-0x0000000000078000-memory.dmp
      Filesize

      32KB

    • memory/1396-84-0x0000000000000000-mapping.dmp
    • memory/1664-96-0x0000000000000000-mapping.dmp
    • memory/1728-60-0x0000000000000000-mapping.dmp
    • memory/1736-80-0x0000000000000000-mapping.dmp
    • memory/1736-94-0x0000000073F90000-0x000000007453B000-memory.dmp
      Filesize

      5.7MB

    • memory/1736-89-0x0000000073F90000-0x000000007453B000-memory.dmp
      Filesize

      5.7MB

    • memory/1780-54-0x0000000074D61000-0x0000000074D63000-memory.dmp
      Filesize

      8KB

    • memory/1824-91-0x0000000000000000-mapping.dmp
    • memory/1936-95-0x0000000000000000-mapping.dmp
    • memory/1992-67-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-69-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-72-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-73-0x0000000000401190-mapping.dmp
    • memory/1992-76-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-70-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-68-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-66-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1992-77-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB