Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 12:07
Static task
static1
Behavioral task
behavioral1
Sample
shipment 04629673893.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
shipment 04629673893.exe
Resource
win10v2004-20230220-en
General
-
Target
shipment 04629673893.exe
-
Size
743KB
-
MD5
4865f16a685bc3b34a91f595247f30e7
-
SHA1
c9e898e4c7c9026f0fded242d499ddb61b69a639
-
SHA256
64b6ea060734356b1932cbe5f252ba9fb6169717a0ab7dd9063b3ee19c71b057
-
SHA512
db1f449a2983bcaee04aa66852d94190ad02482c9944b0d13134cdb82379d6a86721d5412903090450ce0b4ec8e5e9a629cad321b76a2a762d6bc7f548ebd864
-
SSDEEP
12288:Qt1esNS+7GrRybegXjup/inqt0qKmwRZ5J+:ri7GrRyKTNh0awr5Y
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5970985875:AAGxcS7riy4ZlEmFj2Z031AsUoRvment2iI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
shipment 04629673893.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shipment 04629673893.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shipment 04629673893.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shipment 04629673893.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
shipment 04629673893.exedescription pid process target process PID 4432 set thread context of 824 4432 shipment 04629673893.exe shipment 04629673893.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
shipment 04629673893.exepid process 824 shipment 04629673893.exe 824 shipment 04629673893.exe 824 shipment 04629673893.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
shipment 04629673893.exedescription pid process Token: SeDebugPrivilege 824 shipment 04629673893.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
shipment 04629673893.exepid process 824 shipment 04629673893.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
shipment 04629673893.exedescription pid process target process PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe PID 4432 wrote to memory of 824 4432 shipment 04629673893.exe shipment 04629673893.exe -
outlook_office_path 1 IoCs
Processes:
shipment 04629673893.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shipment 04629673893.exe -
outlook_win_path 1 IoCs
Processes:
shipment 04629673893.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 shipment 04629673893.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipment 04629673893.exe"C:\Users\Admin\AppData\Local\Temp\shipment 04629673893.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\shipment 04629673893.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD5e72888b5960716cf170f3e1becd14370
SHA10aeefd2d4a7948a03aad625ca86fc34d79adf248
SHA2568317f594f74040b50e1b88f4aba5e6da3423bf47fe91df59e6e85f37b1f7e0ab
SHA5129cdfda6fc4f324dfd8d53b46610114252431a5d26296a6f3d606b8ffeef172263fbde9ce0a1b2b9232dabcdabd33d6677e9a5f7693b175f24cea622c31b5c6b7