Analysis

  • max time kernel
    34s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2023, 16:21

General

  • Target

    cotización y diseños de muestra.exe

  • Size

    2.7MB

  • MD5

    38b3d465545a56ea977ba43dcda97b16

  • SHA1

    e8fc4cb22b0a7e6f24c762b9bd809c8f10a82a84

  • SHA256

    89b5371841e3eb63f290b60717e55ddfc8518803e14419d5c9ad3a6bf111c2c8

  • SHA512

    f7966e2904f379fc816cd2326b2ae92d9a92fc28bd59784f64d796486124708ca238134ef0c3bfe892cdea71ac650b2db82209de20378e84544162dcb2774ecc

  • SSDEEP

    49152:rkvBmg2iRQHsne0LqnefX5qDRYVKSFzY7RlW:

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cotización y diseños de muestra.exe
    "C:\Users\Admin\AppData\Local\Temp\cotización y diseños de muestra.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1488
    • C:\Users\Admin\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe
      "C:\Users\Admin\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:768
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
      2⤵
        PID:744
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        2⤵
          PID:796
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          2⤵
            PID:1748
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
            2⤵
              PID:884
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              2⤵
                PID:892
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                2⤵
                  PID:912
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                  2⤵
                    PID:928
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    2⤵
                      PID:1744
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                      2⤵
                        PID:1244
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                        2⤵
                          PID:1944

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe

                        Filesize

                        167KB

                        MD5

                        b1dfd2b85a645040d8c89d0fced4340a

                        SHA1

                        b7363f57984d1853255075d6d0c59488a4764eb7

                        SHA256

                        7091eded4bed4bf6c218d839ff5e3c98a01119311bc9aedeabfd48502d3d3e62

                        SHA512

                        a139fdd4836c46ffab5fc5234ad58592f9a3c175d6f0d3b5223a9d9321621b136c3288f2f24abc12e0669084e88b5d87b4c68d68dfd75ad4d76efe9460e8349d

                      • C:\Users\Admin\AppData\Local\Temp\Hxpqwdnjsynypvjkzfile.exe

                        Filesize

                        167KB

                        MD5

                        b1dfd2b85a645040d8c89d0fced4340a

                        SHA1

                        b7363f57984d1853255075d6d0c59488a4764eb7

                        SHA256

                        7091eded4bed4bf6c218d839ff5e3c98a01119311bc9aedeabfd48502d3d3e62

                        SHA512

                        a139fdd4836c46ffab5fc5234ad58592f9a3c175d6f0d3b5223a9d9321621b136c3288f2f24abc12e0669084e88b5d87b4c68d68dfd75ad4d76efe9460e8349d

                      • C:\Users\Admin\AppData\Roaming\KbWSe\KbWSe.exe

                        Filesize

                        167KB

                        MD5

                        b1dfd2b85a645040d8c89d0fced4340a

                        SHA1

                        b7363f57984d1853255075d6d0c59488a4764eb7

                        SHA256

                        7091eded4bed4bf6c218d839ff5e3c98a01119311bc9aedeabfd48502d3d3e62

                        SHA512

                        a139fdd4836c46ffab5fc5234ad58592f9a3c175d6f0d3b5223a9d9321621b136c3288f2f24abc12e0669084e88b5d87b4c68d68dfd75ad4d76efe9460e8349d

                      • memory/768-102-0x0000000004F10000-0x0000000004F50000-memory.dmp

                        Filesize

                        256KB

                      • memory/768-77-0x0000000004F10000-0x0000000004F50000-memory.dmp

                        Filesize

                        256KB

                      • memory/768-75-0x0000000000250000-0x0000000000280000-memory.dmp

                        Filesize

                        192KB

                      • memory/1488-66-0x0000000002700000-0x0000000002780000-memory.dmp

                        Filesize

                        512KB

                      • memory/1488-65-0x0000000001FC0000-0x0000000001FC8000-memory.dmp

                        Filesize

                        32KB

                      • memory/1488-67-0x0000000002700000-0x0000000002780000-memory.dmp

                        Filesize

                        512KB

                      • memory/1488-68-0x0000000002700000-0x0000000002780000-memory.dmp

                        Filesize

                        512KB

                      • memory/1488-64-0x000000001B250000-0x000000001B532000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/1656-54-0x0000000000D70000-0x0000000001024000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/1656-59-0x000000001B1E0000-0x000000001B260000-memory.dmp

                        Filesize

                        512KB

                      • memory/1656-58-0x000000001B150000-0x000000001B1E2000-memory.dmp

                        Filesize

                        584KB

                      • memory/1656-57-0x000000001B930000-0x000000001BB38000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/1656-56-0x000000001B1E0000-0x000000001B260000-memory.dmp

                        Filesize

                        512KB

                      • memory/1656-55-0x0000000000160000-0x0000000000185000-memory.dmp

                        Filesize

                        148KB