Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2023, 22:55

General

  • Target

    OfferrSTA56009214.exe

  • Size

    601KB

  • MD5

    7596f135c2ca2eb2ac710afb0a6bf859

  • SHA1

    7761f78e4f434279cee142351208b6e31b0a76de

  • SHA256

    98e083931633327240ddc246bb3afc187cddfe0fd4196fe964f344ae8912c0b4

  • SHA512

    83991c73203c0b4f59b39db0080b6c26f55cdc925c06c4e5fe6fa3f7876c7ba2456ca96ac1cee91b68dfa7839aae8ab590e17c452bc1c05881a998d1e4952771

  • SSDEEP

    12288:66k+cpuflY/dwUc+RigJYPZfajEceE5Bj:66k1UlYiUJi4oZfaocN5

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OfferrSTA56009214.exe
    "C:\Users\Admin\AppData\Local\Temp\OfferrSTA56009214.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"
      2⤵
        PID:2056
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"
        2⤵
          PID:2268
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
          2⤵
            PID:2200
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"
            2⤵
              PID:2224
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
              2⤵
                PID:3648
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"
                2⤵
                  PID:908
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
                  2⤵
                    PID:480
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                    2⤵
                      PID:1276
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"
                      2⤵
                        PID:1376
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
                        2⤵
                          PID:3076
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                          2⤵
                            PID:1640
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
                            2⤵
                              PID:2384
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
                              2⤵
                                PID:2116
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
                                2⤵
                                  PID:3032
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                                  2⤵
                                    PID:3252
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                    2⤵
                                      PID:3964
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                                      2⤵
                                      • Accesses Microsoft Outlook profiles
                                      • Suspicious use of AdjustPrivilegeToken
                                      • outlook_office_path
                                      • outlook_win_path
                                      PID:4620

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • memory/4616-133-0x000001DF36C30000-0x000001DF36CCA000-memory.dmp

                                    Filesize

                                    616KB

                                  • memory/4616-134-0x000001DF510A0000-0x000001DF51116000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/4616-135-0x000001DF37000000-0x000001DF37010000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4616-136-0x000001DF37030000-0x000001DF3704E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/4620-137-0x0000000000400000-0x0000000000430000-memory.dmp

                                    Filesize

                                    192KB

                                  • memory/4620-139-0x00000000055D0000-0x0000000005B74000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/4620-140-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4620-141-0x0000000004E60000-0x0000000004EC6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/4620-142-0x0000000006120000-0x00000000061B2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/4620-143-0x0000000006250000-0x000000000625A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/4620-144-0x00000000061C0000-0x0000000006210000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/4620-145-0x0000000006540000-0x0000000006702000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4620-146-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

                                    Filesize

                                    64KB