Analysis
-
max time kernel
84s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 21:01
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230221-en
General
-
Target
tmp.exe
-
Size
872KB
-
MD5
6e4c51c65c966531518f3ace3499ade7
-
SHA1
79920fbff850c5a632e0e2b43ff400f13a8a6238
-
SHA256
da56d8f4ee82eaeb593bd5cd320e4d544163c674e26031edb6bd5c409953b2eb
-
SHA512
57915ac32b27a793a98071731140466678316364192d9ab98abdb8bf243f34d47c040b6bd970a1e854c40f2801a134391af44529cbdc6672490bf283d61acabb
-
SSDEEP
12288:9ZGQ4l+T38LYYOyTFW2HqIcUrMQEsVuggBP3ABZbzQLKHdHz0:mQ4S8YzGHGMMQEscggBIBF8KH
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gcWPrHZ = "C:\\Users\\Admin\\AppData\\Roaming\\gcWPrHZ\\gcWPrHZ.exe" tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4792 set thread context of 4552 4792 tmp.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4792 tmp.exe 4792 tmp.exe 4792 tmp.exe 4792 tmp.exe 4792 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4792 tmp.exe Token: SeDebugPrivilege 4552 tmp.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4312 4792 tmp.exe 91 PID 4792 wrote to memory of 4312 4792 tmp.exe 91 PID 4792 wrote to memory of 4312 4792 tmp.exe 91 PID 4792 wrote to memory of 3664 4792 tmp.exe 93 PID 4792 wrote to memory of 3664 4792 tmp.exe 93 PID 4792 wrote to memory of 3664 4792 tmp.exe 93 PID 4792 wrote to memory of 2800 4792 tmp.exe 94 PID 4792 wrote to memory of 2800 4792 tmp.exe 94 PID 4792 wrote to memory of 2800 4792 tmp.exe 94 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 PID 4792 wrote to memory of 4552 4792 tmp.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SbhNObg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF38C.tmp"2⤵
- Creates scheduled task(s)
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"{path}"2⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"{path}"2⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
1KB
MD53d47c535f7b0b72926b52c045cae5122
SHA1ec8c65fa107a20f97012be56bcc858eb915d54cd
SHA256cba6dee5fc6f7091da846ef5b3285a3b6f5b86a7da9791e9887b1191e8fc5293
SHA512266e93fd7321c6e18f4c828d2f05a1aa920a358a4c848adeef944d3b70026c7ba09eb5e41d23cb7db82d2f4b5c3a21b5bb55afdf3e64581b66470691f1c423fb