Analysis

  • max time kernel
    131s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2023 20:14

General

  • Target

    USD$46,860.00 All payments.exe

  • Size

    638KB

  • MD5

    c3f5d351824706c4a655c3759ab10afe

  • SHA1

    8d72cc01c11767e3a7bbf711d4c958870114b215

  • SHA256

    5c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838

  • SHA512

    f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c

  • SSDEEP

    12288:unlrEdwemEo8V5VnqU58iN82RCAP1L59rrCoh9zcL7ql1hYsSj:QlbiV5hP5HNhl1vCGC7Qb

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\USD$46,860.00 All payments.exe
    "C:\Users\Admin\AppData\Local\Temp\USD$46,860.00 All payments.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:556
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:632
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE2D1.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1564
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
          4⤵
            PID:1052
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
            4⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:1520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpE2D1.tmp.bat

      Filesize

      151B

      MD5

      9ac7fb5010b4f25cd4c6fb0ac9da708e

      SHA1

      cc8ca9af6acacbf68aacf6f843cc92592e848f47

      SHA256

      aa45b75fe1872598b9719c56f56b39b8e0c03ce99ac7870b12aa62bb30e6e2e4

      SHA512

      85b67208dba726a067ce2cd6ab41ed3ad4fc19827b5f4cb00e9eb7751ddcc1e0f235b02634ee1660a60fe18a3cc4fbebef4c011f4ca05d321b129a7bcd933804

    • C:\Users\Admin\AppData\Local\Temp\tmpE2D1.tmp.bat

      Filesize

      151B

      MD5

      9ac7fb5010b4f25cd4c6fb0ac9da708e

      SHA1

      cc8ca9af6acacbf68aacf6f843cc92592e848f47

      SHA256

      aa45b75fe1872598b9719c56f56b39b8e0c03ce99ac7870b12aa62bb30e6e2e4

      SHA512

      85b67208dba726a067ce2cd6ab41ed3ad4fc19827b5f4cb00e9eb7751ddcc1e0f235b02634ee1660a60fe18a3cc4fbebef4c011f4ca05d321b129a7bcd933804

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      638KB

      MD5

      c3f5d351824706c4a655c3759ab10afe

      SHA1

      8d72cc01c11767e3a7bbf711d4c958870114b215

      SHA256

      5c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838

      SHA512

      f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      638KB

      MD5

      c3f5d351824706c4a655c3759ab10afe

      SHA1

      8d72cc01c11767e3a7bbf711d4c958870114b215

      SHA256

      5c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838

      SHA512

      f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c

    • \Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      638KB

      MD5

      c3f5d351824706c4a655c3759ab10afe

      SHA1

      8d72cc01c11767e3a7bbf711d4c958870114b215

      SHA256

      5c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838

      SHA512

      f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c

    • memory/1240-54-0x00000000012E0000-0x0000000001384000-memory.dmp

      Filesize

      656KB

    • memory/1240-55-0x000000001B340000-0x000000001B3C0000-memory.dmp

      Filesize

      512KB

    • memory/1240-56-0x0000000000490000-0x0000000000500000-memory.dmp

      Filesize

      448KB

    • memory/1520-75-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1520-73-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1520-77-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1520-78-0x0000000004F80000-0x0000000004FC0000-memory.dmp

      Filesize

      256KB

    • memory/1520-79-0x0000000004F80000-0x0000000004FC0000-memory.dmp

      Filesize

      256KB

    • memory/1596-71-0x000000001B0F0000-0x000000001B170000-memory.dmp

      Filesize

      512KB

    • memory/1596-72-0x000000001B0F0000-0x000000001B170000-memory.dmp

      Filesize

      512KB

    • memory/1596-70-0x00000000011A0000-0x0000000001244000-memory.dmp

      Filesize

      656KB