Analysis

  • max time kernel
    36s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2022 20:05

General

  • Target

    2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe

  • Size

    358KB

  • MD5

    7db0bc0c978bda0048ac2944b9b86245

  • SHA1

    66e87764ff09ebba04681cbc2c61a43cbfa595b5

  • SHA256

    2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063

  • SHA512

    a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb

  • SSDEEP

    6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5801961827:AAHU2YhkfiXQwgVf7WnbO6mcJG_3zpTOec4/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
    "C:\Users\Admin\AppData\Local\Temp\2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe
      "C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe" C:\Users\Admin\AppData\Local\Temp\jezmemc.dh
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe
        "C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:2032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe

    Filesize

    267KB

    MD5

    6376674d9cb734641768158e12de22ac

    SHA1

    4c53bc87384e851f20d69f966dd78473831acb5f

    SHA256

    85a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59

    SHA512

    42f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0

  • C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe

    Filesize

    267KB

    MD5

    6376674d9cb734641768158e12de22ac

    SHA1

    4c53bc87384e851f20d69f966dd78473831acb5f

    SHA256

    85a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59

    SHA512

    42f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0

  • C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe

    Filesize

    267KB

    MD5

    6376674d9cb734641768158e12de22ac

    SHA1

    4c53bc87384e851f20d69f966dd78473831acb5f

    SHA256

    85a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59

    SHA512

    42f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0

  • C:\Users\Admin\AppData\Local\Temp\jezmemc.dh

    Filesize

    5KB

    MD5

    3db488222c4269cd86ce00231240a46d

    SHA1

    2c75455dd19e6773adc23d8f341a268a33dfa7f5

    SHA256

    a4efc05c8ebc47650c3be4d99f748217ec5ecc8039323c2b7634bbdf69bf2157

    SHA512

    5078bba8f217fd18bc86b8451b96762e463881d738219cf5cef67584fefb71722230d554b09ab4c76cdfc5376d2c34257b457c060b038dec3d0438cb4ed06e6a

  • C:\Users\Admin\AppData\Local\Temp\lyftczbkcc.tx

    Filesize

    241KB

    MD5

    5378624f251a39f83153afa9b648260e

    SHA1

    28f23387839063f3b870698f74671c817db79f65

    SHA256

    b4f1a9ed091fc4731f07784e655219e64a654e772876a2625796150da1cf9faf

    SHA512

    c6beded1813692862409a3d156bdd50865a26367ac439b362e081a3eb0419f22bdd3e2e00da209d0257cc22f85feca076e3ec80658d41bbc0f51ec64f644b5c9

  • \Users\Admin\AppData\Local\Temp\flogjpnc.exe

    Filesize

    267KB

    MD5

    6376674d9cb734641768158e12de22ac

    SHA1

    4c53bc87384e851f20d69f966dd78473831acb5f

    SHA256

    85a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59

    SHA512

    42f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0

  • \Users\Admin\AppData\Local\Temp\flogjpnc.exe

    Filesize

    267KB

    MD5

    6376674d9cb734641768158e12de22ac

    SHA1

    4c53bc87384e851f20d69f966dd78473831acb5f

    SHA256

    85a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59

    SHA512

    42f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0

  • memory/1276-56-0x0000000000000000-mapping.dmp

  • memory/1452-54-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/2032-62-0x0000000000401896-mapping.dmp

  • memory/2032-65-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2032-66-0x0000000000380000-0x00000000003B0000-memory.dmp

    Filesize

    192KB