Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2023, 06:40

General

  • Target

    R09876556789000G.jar

  • Size

    1.1MB

  • MD5

    89b1c7884d5ec1bfc18142f725fde3f8

  • SHA1

    e95ab3a5eca60dd08fe4703abe420a29cf357a2f

  • SHA256

    b79d1da91f9a15f6bc930bd5b4bf714c016862f04052c3dd5cb79c3464e0f775

  • SHA512

    1f81f2de35ad05321fc3761b601a1a82af7e64d93f5072acfbcd262a34ae8acd610a93629369963dfa35e893aae7b423030456a896d11bc965544f73aa94934f

  • SSDEEP

    24576:EoOQtokLVRpJOemLmrq5OI5HR735U09kLVRpJOemLmrq5OI5HR735U0C:EjkBRpXrq5nHR779kBRpXrq5nHR77C

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\R09876556789000G.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\9qHd.exe
      C:\Users\Admin\9qHd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\9qHd.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
      • C:\Users\Admin\9qHd.exe
        "C:\Users\Admin\9qHd.exe"
        3⤵
        • Executes dropped EXE
        PID:740
      • C:\Users\Admin\9qHd.exe
        "C:\Users\Admin\9qHd.exe"
        3⤵
        • Executes dropped EXE
        PID:2772
      • C:\Users\Admin\9qHd.exe
        "C:\Users\Admin\9qHd.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2036
    • C:\Users\Admin\hmx6w5V.exe
      "C:\Users\Admin\hmx6w5V.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\hmx6w5V.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
        3⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4512
      • C:\Users\Admin\hmx6w5V.exe
        "C:\Users\Admin\hmx6w5V.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\9qHd.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\9qHd.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\9qHd.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\9qHd.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\9qHd.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Powershell.exe.log

          Filesize

          1KB

          MD5

          def65711d78669d7f8e69313be4acf2e

          SHA1

          6522ebf1de09eeb981e270bd95114bc69a49cda6

          SHA256

          aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

          SHA512

          05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          15KB

          MD5

          3c55878f77a23a052dae2e7c9b0bbdad

          SHA1

          bf42dc0b4b911ee5e3b942649fdfd895cb0763de

          SHA256

          d6a6bb38e1bbb1239cad3f5b806bb7507f3fdf67d44cbb1b5c0b7fb74a9b3158

          SHA512

          a37115bf63335ba0bf902c1c1a76ea4bf57ea3bb370f4505c131a35e681bcf7f4488b8590cec7d88423aeb3362522dcc34f0e60688cdb2da485408278b571f1d

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fhpyzbt3.r42.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\hmx6w5V.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\hmx6w5V.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\hmx6w5V.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • C:\Users\Admin\hmx6w5V.exe

          Filesize

          815KB

          MD5

          d1f6fe10493bfd93348ff96d17fc74d9

          SHA1

          f25bbe742f47d68d63b78b9e9a7bb0a75a285069

          SHA256

          0c8d77c17748259273ec1465d53b38444f5102d79cdd14bd3053e3cb381d7322

          SHA512

          a868977429b3237adbe8fa5e0ea0cf46dd4063b2fa56009d46e71507468f19d85b9fcdd7df14949f9b4f20682b5f272f70417c82c9b0b83f6acf4b8764efc806

        • memory/2036-249-0x0000000006860000-0x0000000006A22000-memory.dmp

          Filesize

          1.8MB

        • memory/2036-248-0x0000000006640000-0x0000000006690000-memory.dmp

          Filesize

          320KB

        • memory/2036-234-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/2036-252-0x0000000004F70000-0x0000000004F80000-memory.dmp

          Filesize

          64KB

        • memory/4076-197-0x00000000048E0000-0x00000000048F0000-memory.dmp

          Filesize

          64KB

        • memory/4076-186-0x0000000004970000-0x0000000004A02000-memory.dmp

          Filesize

          584KB

        • memory/4512-237-0x0000000006480000-0x00000000064A2000-memory.dmp

          Filesize

          136KB

        • memory/4512-200-0x0000000005030000-0x0000000005658000-memory.dmp

          Filesize

          6.2MB

        • memory/4512-201-0x0000000004F50000-0x0000000004F72000-memory.dmp

          Filesize

          136KB

        • memory/4512-203-0x00000000057D0000-0x0000000005836000-memory.dmp

          Filesize

          408KB

        • memory/4512-235-0x00000000064B0000-0x0000000006546000-memory.dmp

          Filesize

          600KB

        • memory/4512-213-0x00000000049F0000-0x0000000004A00000-memory.dmp

          Filesize

          64KB

        • memory/4512-222-0x00000000049F0000-0x0000000004A00000-memory.dmp

          Filesize

          64KB

        • memory/4536-195-0x0000000000550000-0x0000000000551000-memory.dmp

          Filesize

          4KB

        • memory/4536-194-0x0000000000550000-0x0000000000551000-memory.dmp

          Filesize

          4KB

        • memory/4536-154-0x0000000000550000-0x0000000000551000-memory.dmp

          Filesize

          4KB

        • memory/4536-189-0x0000000000550000-0x0000000000551000-memory.dmp

          Filesize

          4KB

        • memory/4536-146-0x0000000000550000-0x0000000000551000-memory.dmp

          Filesize

          4KB

        • memory/4752-214-0x0000000004770000-0x0000000004780000-memory.dmp

          Filesize

          64KB

        • memory/4752-232-0x0000000005C20000-0x0000000005C3E000-memory.dmp

          Filesize

          120KB

        • memory/4752-236-0x00000000060D0000-0x00000000060EA000-memory.dmp

          Filesize

          104KB

        • memory/4752-199-0x0000000004640000-0x0000000004676000-memory.dmp

          Filesize

          216KB

        • memory/4752-224-0x0000000004770000-0x0000000004780000-memory.dmp

          Filesize

          64KB

        • memory/4752-202-0x00000000054D0000-0x0000000005536000-memory.dmp

          Filesize

          408KB

        • memory/4904-184-0x0000000000DA0000-0x0000000000E72000-memory.dmp

          Filesize

          840KB

        • memory/4904-185-0x0000000005DF0000-0x0000000006394000-memory.dmp

          Filesize

          5.6MB

        • memory/4904-196-0x00000000058E0000-0x000000000597C000-memory.dmp

          Filesize

          624KB

        • memory/4904-198-0x0000000005980000-0x0000000005990000-memory.dmp

          Filesize

          64KB

        • memory/4972-233-0x0000000005680000-0x0000000005690000-memory.dmp

          Filesize

          64KB

        • memory/4972-226-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/4972-250-0x0000000006E00000-0x0000000006E0A000-memory.dmp

          Filesize

          40KB

        • memory/4972-251-0x0000000005680000-0x0000000005690000-memory.dmp

          Filesize

          64KB