Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2023 12:07

General

  • Target

    d088acc3d5699c3f7a024683ddda2503624535bc7648a0e80fa34f890208865d.exe

  • Size

    1.6MB

  • MD5

    d1f453af9f56a30af3db2d6c6feb40e2

  • SHA1

    8edce17ea7a49361d5464ca9ba0088e5e1f3431f

  • SHA256

    d088acc3d5699c3f7a024683ddda2503624535bc7648a0e80fa34f890208865d

  • SHA512

    6cc348801c48201150be4095c4a240f1e0740962ade382cb08333c12c0891bfff45d4f5e109117f9567b7fd5e9e5d3afcd28c3b50dd0a1f76eb351609738c595

  • SSDEEP

    49152:WghvKOWTPrvvJA/lsXWy7KIfN/m5llkvvEnKKgN:WghvLKzBANpa5flm5lCs1gN

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect rhadamanthys stealer shellcode 1 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2628
      • C:\Windows\SysWOW64\fontview.exe
        "C:\Windows\SYSWOW64\fontview.exe"
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:3520
    • C:\Users\Admin\AppData\Local\Temp\d088acc3d5699c3f7a024683ddda2503624535bc7648a0e80fa34f890208865d.exe
      "C:\Users\Admin\AppData\Local\Temp\d088acc3d5699c3f7a024683ddda2503624535bc7648a0e80fa34f890208865d.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
        2⤵
          PID:4792
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
          2⤵
            PID:3504
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
            2⤵
            • Accesses Microsoft Outlook profiles
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:512
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 1268
            2⤵
            • Program crash
            PID:1968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 556
            2⤵
            • Program crash
            PID:1812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3936 -ip 3936
          1⤵
            PID:4804
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3936 -ip 3936
            1⤵
              PID:4068

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\240551421.dll

              Filesize

              335KB

              MD5

              c2eb6888cefe5b07e48b380c44e19f45

              SHA1

              971e64bd7171fcb55c7aa2058896a1c0d982a911

              SHA256

              10683f15f53e671df98e8215e11c28db7a6c81cc4d1d08e5cc708210ac1d2fe2

              SHA512

              50806c6f1681d9c8e5d8ab3d79e7575d41a83098fd441e0ead07fd45c90f3607fd8d2bcc410f372595d7755234527b77be0489b3fc9b4f6bfc87225ace1bd8af

            • memory/512-145-0x0000000004A40000-0x0000000004AA6000-memory.dmp

              Filesize

              408KB

            • memory/512-144-0x0000000004FF0000-0x0000000005594000-memory.dmp

              Filesize

              5.6MB

            • memory/512-155-0x0000000006620000-0x00000000067E2000-memory.dmp

              Filesize

              1.8MB

            • memory/512-154-0x00000000062F0000-0x0000000006340000-memory.dmp

              Filesize

              320KB

            • memory/512-138-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/512-140-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/512-152-0x00000000060A0000-0x00000000060AA000-memory.dmp

              Filesize

              40KB

            • memory/512-151-0x00000000060B0000-0x0000000006142000-memory.dmp

              Filesize

              584KB

            • memory/512-137-0x0000000000000000-mapping.dmp

            • memory/3504-136-0x0000000000000000-mapping.dmp

            • memory/3520-148-0x0000000000745000-0x0000000000747000-memory.dmp

              Filesize

              8KB

            • memory/3520-147-0x0000000000745000-0x0000000000747000-memory.dmp

              Filesize

              8KB

            • memory/3520-157-0x0000000000170000-0x00000000001A5000-memory.dmp

              Filesize

              212KB

            • memory/3520-142-0x0000000000170000-0x00000000001A5000-memory.dmp

              Filesize

              212KB

            • memory/3520-146-0x0000000000170000-0x00000000001A5000-memory.dmp

              Filesize

              212KB

            • memory/3520-149-0x0000000000690000-0x00000000006AD000-memory.dmp

              Filesize

              116KB

            • memory/3520-150-0x0000000002530000-0x0000000003530000-memory.dmp

              Filesize

              16.0MB

            • memory/3520-143-0x0000000000000000-mapping.dmp

            • memory/3936-134-0x0000000010160000-0x000000001034C000-memory.dmp

              Filesize

              1.9MB

            • memory/3936-153-0x0000000002F70000-0x00000000030CA000-memory.dmp

              Filesize

              1.4MB

            • memory/3936-132-0x0000000002F70000-0x00000000030CA000-memory.dmp

              Filesize

              1.4MB

            • memory/3936-133-0x0000000010160000-0x000000001034C000-memory.dmp

              Filesize

              1.9MB

            • memory/3936-156-0x0000000010160000-0x000000001034C000-memory.dmp

              Filesize

              1.9MB

            • memory/3936-158-0x0000000002F70000-0x00000000030CA000-memory.dmp

              Filesize

              1.4MB

            • memory/4792-135-0x0000000000000000-mapping.dmp