Resubmissions

22/03/2023, 10:18

230322-mbyqgsab6x 10

19/03/2023, 13:12

230319-qfgjjsge22 10

Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2023, 10:18

General

  • Target

    No. I20220052.exe

  • Size

    518KB

  • MD5

    d7bbc6ef7a09d615e3b8c864b83a03f2

  • SHA1

    e5c05e7a380017c40eb766d7029414c4edad264b

  • SHA256

    2f40f6ef3c46c7e7a51531385abc337e60fed2a22d4a604e39c94ac05e95e03b

  • SHA512

    6e2cae2b05d0839bf09716024bfe93ebf95073f9fa3d211e662e36653c47ae96722c50a41ab66250ff2f3d474382116804e685952791c7218d6c0f251e571533

  • SSDEEP

    12288:sPqlMdaMAUQ1wQhHV7MyEqqpeabdcfOYuMAv3npMovIn05dqrlb:sikqTfrE3PbdlY6Ghb

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\No. I20220052.exe
    "C:\Users\Admin\AppData\Local\Temp\No. I20220052.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"
      2⤵
        PID:1612
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
        2⤵
          PID:1712
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
          2⤵
            PID:884
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
            2⤵
              PID:836
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
              2⤵
                PID:1168
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
                2⤵
                  PID:904
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
                  2⤵
                    PID:684
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                    2⤵
                      PID:1480
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"
                      2⤵
                        PID:1912
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
                        2⤵
                          PID:520
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
                          2⤵
                            PID:580
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
                            2⤵
                              PID:340
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
                              2⤵
                                PID:1476
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                                2⤵
                                  PID:572
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1080
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 168
                                    3⤵
                                    • Program crash
                                    PID:1132

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • memory/1080-57-0x0000000000400000-0x0000000000430000-memory.dmp

                                Filesize

                                192KB

                              • memory/1728-54-0x0000000000270000-0x00000000002F6000-memory.dmp

                                Filesize

                                536KB

                              • memory/1728-55-0x000000001B130000-0x000000001B1B0000-memory.dmp

                                Filesize

                                512KB

                              • memory/1728-56-0x0000000002190000-0x00000000021FE000-memory.dmp

                                Filesize

                                440KB