Analysis

  • max time kernel
    75s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-03-2023 11:18

General

  • Target

    AWB #3827747403.pdf.exe

  • Size

    959KB

  • MD5

    960953e9848501c8afad1b0dbfdd92f8

  • SHA1

    20347baee4f16f123f9acf41ee00a4c86e258f32

  • SHA256

    ed12b65c4ad6c7849a23e7e6f5b0cc6827af4dab8ff0eef24d78afd9f4bfec1b

  • SHA512

    f0e30e5acc130073bc26c91d25865b0fa079ca7b15fac9357ad78769eff5ee2da16ff724f66b783669085fcf6118cc35fc10221f7c984aef75ee717a1864f0c5

  • SSDEEP

    24576:YqWOqd2UhNLdYHHR3SBvZsM8LtncfOJT58:x/qLK34veNLVcfg

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    marcellinus360

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AWB #3827747403.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\AWB #3827747403.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TgogwrFbdQiEp.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:676
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TgogwrFbdQiEp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA7A6.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpA7A6.tmp

    Filesize

    1KB

    MD5

    ef5104d404f7dc3f530e917d93113d6a

    SHA1

    e71c32ddf11b5bf2a549aef1249eebd744cda24d

    SHA256

    471a35e6bd8af5e4516920cd0d08bbf8fb2db84cc1ba5a367d5fbe7ef189cce9

    SHA512

    654350e57e45eff401d8060b95e7f516c89dac34b094ce099d8d64fc42f40cf218a1e3ceb6cbd3fb942e412d107425a9b0b9d0a47b75e9cd52599a4cf984ab27

  • memory/676-80-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/676-79-0x0000000002600000-0x0000000002640000-memory.dmp

    Filesize

    256KB

  • memory/820-77-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/820-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/820-103-0x0000000004CE0000-0x0000000004D20000-memory.dmp

    Filesize

    256KB

  • memory/820-102-0x0000000004CE0000-0x0000000004D20000-memory.dmp

    Filesize

    256KB

  • memory/820-101-0x0000000004CE0000-0x0000000004D20000-memory.dmp

    Filesize

    256KB

  • memory/820-68-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/820-69-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/820-70-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/820-73-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/820-78-0x0000000004CE0000-0x0000000004D20000-memory.dmp

    Filesize

    256KB

  • memory/820-71-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/820-75-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1048-54-0x0000000000030000-0x0000000000126000-memory.dmp

    Filesize

    984KB

  • memory/1048-58-0x0000000001F60000-0x0000000001F6C000-memory.dmp

    Filesize

    48KB

  • memory/1048-56-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1048-55-0x00000000008B0000-0x00000000008C6000-memory.dmp

    Filesize

    88KB

  • memory/1048-65-0x0000000004730000-0x0000000004770000-memory.dmp

    Filesize

    256KB

  • memory/1048-57-0x0000000007380000-0x00000000073C0000-memory.dmp

    Filesize

    256KB

  • memory/1048-59-0x0000000007550000-0x0000000007606000-memory.dmp

    Filesize

    728KB