Analysis

  • max time kernel
    46s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2023 19:28

General

  • Target

    5f29ac3545ac089cee4cb9052f68862c273119a8.exe

  • Size

    483KB

  • MD5

    40754f9261d344e7ddef26387e0d13c2

  • SHA1

    5f29ac3545ac089cee4cb9052f68862c273119a8

  • SHA256

    14e7c7441ca7103c7cc9e96721342a7e60716c836f26a85037efdf6c7feae849

  • SHA512

    a675a3f4a9fce9551d369cdfb4c2590990ae976143ae010318571f9b2793f1b1bb3fe7c627e57dab67eed6f2bef919440c49cb62d8591cc02b847ea160b8eaf5

  • SSDEEP

    6144:2Ya630iY2KckCLgfKrUP1goSHMlR+zNDcbXoP04zf3KO:2Y2L2/ZwPJoCkhgjN4D

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f29ac3545ac089cee4cb9052f68862c273119a8.exe
    "C:\Users\Admin\AppData\Local\Temp\5f29ac3545ac089cee4cb9052f68862c273119a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe
      "C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe" C:\Users\Admin\AppData\Local\Temp\ybgntokhtc.e
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe
        "C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

    Filesize

    52KB

    MD5

    bba67cd0ee6868f61d198f642cc78f32

    SHA1

    211032116903b9794f43fa3b3be7f2efc8b6cfe5

    SHA256

    52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

    SHA512

    ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

  • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

    Filesize

    52KB

    MD5

    bba67cd0ee6868f61d198f642cc78f32

    SHA1

    211032116903b9794f43fa3b3be7f2efc8b6cfe5

    SHA256

    52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

    SHA512

    ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

  • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

    Filesize

    52KB

    MD5

    bba67cd0ee6868f61d198f642cc78f32

    SHA1

    211032116903b9794f43fa3b3be7f2efc8b6cfe5

    SHA256

    52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

    SHA512

    ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

  • C:\Users\Admin\AppData\Local\Temp\dumbfxc.mzo

    Filesize

    315KB

    MD5

    ade089553f3615697835151c7b8404e6

    SHA1

    6d0ee5d7ceea51c318216948214595af909027f3

    SHA256

    582841784f46bdd8631a160a21470544c4a3ae1471700072440e0394adcb770c

    SHA512

    c04b18a34d3e7233a79d86ce8b37d5feaba9fdfc6abe599ae3c3e30e8a65dba602b228e2104dd41b1bd5fbb8dbcad8acbbb6c8f3e9b04f60c4664d2de5926b63

  • C:\Users\Admin\AppData\Local\Temp\ybgntokhtc.e

    Filesize

    5KB

    MD5

    4100ab86afc6b1a4f6f10f5d9a691a02

    SHA1

    9a2e4ca006314b6325facc98c0f27e49bc9f0d49

    SHA256

    23ae1eabbc79e9fbee6b8047038fdd86dcac9707db18e769a0fe53bed1d1a105

    SHA512

    6b2ef6a1e28bc1477fd6b78e34509e5e96942b526dc184389516d76c54235bc92329dafee9459b8198b70b151aed07b21208918464b8697f79786e0bb28e84e5

  • \Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

    Filesize

    52KB

    MD5

    bba67cd0ee6868f61d198f642cc78f32

    SHA1

    211032116903b9794f43fa3b3be7f2efc8b6cfe5

    SHA256

    52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

    SHA512

    ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

  • \Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

    Filesize

    52KB

    MD5

    bba67cd0ee6868f61d198f642cc78f32

    SHA1

    211032116903b9794f43fa3b3be7f2efc8b6cfe5

    SHA256

    52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

    SHA512

    ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

  • \Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

    Filesize

    52KB

    MD5

    bba67cd0ee6868f61d198f642cc78f32

    SHA1

    211032116903b9794f43fa3b3be7f2efc8b6cfe5

    SHA256

    52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

    SHA512

    ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

  • memory/1268-63-0x0000000000401896-mapping.dmp

  • memory/1268-66-0x0000000000840000-0x000000000087C000-memory.dmp

    Filesize

    240KB

  • memory/1268-67-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB

  • memory/2012-57-0x0000000000000000-mapping.dmp