Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 13:23

General

  • Target

    INVOICE AND PARKING LIST.exe

  • Size

    668KB

  • MD5

    9efabcfe6bfbfa5dda90ad4dc5894040

  • SHA1

    07c7cdac9aa0658d374331c4b35a9d0190eadbee

  • SHA256

    05472a071f902b974d4ce0d2e605058580f86ab1ad7b6c201c6f9b38608c9b4d

  • SHA512

    bae5eb2fb1dcb683ccab5b4c5f6857ffe300b1719378050e5aab1f97e0c748dbbb5abe91b32cbe8aea3615069f0903a376310ad68ad4ad60d80f1933100e0855

  • SSDEEP

    12288:wFkzrbETClCHskFgFwIyXCDP0SLZigmxSuhnlYiAEt+Ccf8r2Yt93cr:Z76CIskFgqIyXyLOLHbAA+Ccfkg

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.southernboilers.org
  • Port:
    587
  • Username:
    info@southernboilers.org
  • Password:
    Sksmoke2018#
  • Email To:
    obtxxxtf@gmail.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INVOICE AND PARKING LIST.exe
    "C:\Users\Admin\AppData\Local\Temp\INVOICE AND PARKING LIST.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNSzlHrvsnPyrx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8E26.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2720
    • C:\Users\Admin\AppData\Local\Temp\INVOICE AND PARKING LIST.exe
      "{path}"
      2⤵
        PID:3112
      • C:\Users\Admin\AppData\Local\Temp\INVOICE AND PARKING LIST.exe
        "{path}"
        2⤵
          PID:4240
        • C:\Users\Admin\AppData\Local\Temp\INVOICE AND PARKING LIST.exe
          "{path}"
          2⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:4476
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k netsvcs -p
        1⤵
        • Drops file in System32 directory
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2884

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Collection

      Data from Local System

      3
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INVOICE AND PARKING LIST.exe.log
        Filesize

        1KB

        MD5

        84e77a587d94307c0ac1357eb4d3d46f

        SHA1

        83cc900f9401f43d181207d64c5adba7a85edc1e

        SHA256

        e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99

        SHA512

        aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691

      • C:\Users\Admin\AppData\Local\Temp\tmp8E26.tmp
        Filesize

        1KB

        MD5

        b978a5eff984642673a88a43d1bed9a8

        SHA1

        6a40b2bade65b275231cfaaab642da0a48d11fe0

        SHA256

        8053db6e39e619784179b4cac17dd764a36fc92f0ce3338b02f13b0599b9c76d

        SHA512

        edb6ca1dad8d14824887c89075a4322197af553b73b07893052a5ca2f75f837b804173855542836b8321179c19a26ca232bac13e66a3ef5c5e153db9b34e4c96

      • memory/1404-135-0x0000000004F70000-0x000000000500C000-memory.dmp
        Filesize

        624KB

      • memory/1404-132-0x0000000000430000-0x00000000004DE000-memory.dmp
        Filesize

        696KB

      • memory/1404-136-0x0000000004E60000-0x0000000004E6A000-memory.dmp
        Filesize

        40KB

      • memory/1404-134-0x0000000004ED0000-0x0000000004F62000-memory.dmp
        Filesize

        584KB

      • memory/1404-133-0x0000000005480000-0x0000000005A24000-memory.dmp
        Filesize

        5.6MB

      • memory/2720-137-0x0000000000000000-mapping.dmp
      • memory/3112-139-0x0000000000000000-mapping.dmp
      • memory/4240-140-0x0000000000000000-mapping.dmp
      • memory/4476-141-0x0000000000000000-mapping.dmp
      • memory/4476-142-0x0000000000400000-0x000000000043C000-memory.dmp
        Filesize

        240KB

      • memory/4476-144-0x0000000006250000-0x00000000062B6000-memory.dmp
        Filesize

        408KB

      • memory/4476-145-0x0000000006DC0000-0x0000000006E10000-memory.dmp
        Filesize

        320KB