Analysis

  • max time kernel
    40s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2023, 19:06

General

  • Target

    5f29ac3545ac089cee4cb9052f68862c273119a8.exe

  • Size

    483KB

  • MD5

    40754f9261d344e7ddef26387e0d13c2

  • SHA1

    5f29ac3545ac089cee4cb9052f68862c273119a8

  • SHA256

    14e7c7441ca7103c7cc9e96721342a7e60716c836f26a85037efdf6c7feae849

  • SHA512

    a675a3f4a9fce9551d369cdfb4c2590990ae976143ae010318571f9b2793f1b1bb3fe7c627e57dab67eed6f2bef919440c49cb62d8591cc02b847ea160b8eaf5

  • SSDEEP

    6144:2Ya630iY2KckCLgfKrUP1goSHMlR+zNDcbXoP04zf3KO:2Y2L2/ZwPJoCkhgjN4D

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f29ac3545ac089cee4cb9052f68862c273119a8.exe
    "C:\Users\Admin\AppData\Local\Temp\5f29ac3545ac089cee4cb9052f68862c273119a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe
      "C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe" C:\Users\Admin\AppData\Local\Temp\ybgntokhtc.e
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe
        "C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1444

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

          Filesize

          52KB

          MD5

          bba67cd0ee6868f61d198f642cc78f32

          SHA1

          211032116903b9794f43fa3b3be7f2efc8b6cfe5

          SHA256

          52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

          SHA512

          ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

        • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

          Filesize

          52KB

          MD5

          bba67cd0ee6868f61d198f642cc78f32

          SHA1

          211032116903b9794f43fa3b3be7f2efc8b6cfe5

          SHA256

          52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

          SHA512

          ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

        • C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

          Filesize

          52KB

          MD5

          bba67cd0ee6868f61d198f642cc78f32

          SHA1

          211032116903b9794f43fa3b3be7f2efc8b6cfe5

          SHA256

          52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

          SHA512

          ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

        • C:\Users\Admin\AppData\Local\Temp\dumbfxc.mzo

          Filesize

          315KB

          MD5

          ade089553f3615697835151c7b8404e6

          SHA1

          6d0ee5d7ceea51c318216948214595af909027f3

          SHA256

          582841784f46bdd8631a160a21470544c4a3ae1471700072440e0394adcb770c

          SHA512

          c04b18a34d3e7233a79d86ce8b37d5feaba9fdfc6abe599ae3c3e30e8a65dba602b228e2104dd41b1bd5fbb8dbcad8acbbb6c8f3e9b04f60c4664d2de5926b63

        • C:\Users\Admin\AppData\Local\Temp\ybgntokhtc.e

          Filesize

          5KB

          MD5

          4100ab86afc6b1a4f6f10f5d9a691a02

          SHA1

          9a2e4ca006314b6325facc98c0f27e49bc9f0d49

          SHA256

          23ae1eabbc79e9fbee6b8047038fdd86dcac9707db18e769a0fe53bed1d1a105

          SHA512

          6b2ef6a1e28bc1477fd6b78e34509e5e96942b526dc184389516d76c54235bc92329dafee9459b8198b70b151aed07b21208918464b8697f79786e0bb28e84e5

        • \Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

          Filesize

          52KB

          MD5

          bba67cd0ee6868f61d198f642cc78f32

          SHA1

          211032116903b9794f43fa3b3be7f2efc8b6cfe5

          SHA256

          52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

          SHA512

          ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

        • \Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

          Filesize

          52KB

          MD5

          bba67cd0ee6868f61d198f642cc78f32

          SHA1

          211032116903b9794f43fa3b3be7f2efc8b6cfe5

          SHA256

          52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

          SHA512

          ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

        • \Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe

          Filesize

          52KB

          MD5

          bba67cd0ee6868f61d198f642cc78f32

          SHA1

          211032116903b9794f43fa3b3be7f2efc8b6cfe5

          SHA256

          52f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054

          SHA512

          ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca

        • memory/1444-66-0x0000000001D00000-0x0000000001D3C000-memory.dmp

          Filesize

          240KB

        • memory/1444-67-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1796-54-0x00000000761E1000-0x00000000761E3000-memory.dmp

          Filesize

          8KB