Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
Temp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Temp.exe
Resource
win10v2004-20230220-en
General
-
Target
Temp.exe
-
Size
740KB
-
MD5
553eb950e3eac3ea2d9f17d53829efca
-
SHA1
c75270b5e4d375d2aafdcf304e6c0d2997550384
-
SHA256
bf96c7f0b0568187af9d87b440e5637818e606445e738e7d0e40b8fd078ff5f6
-
SHA512
661386e687f6a773fe54ac964a73344c72ac9bb4ae9198f808b2a9d3092ff50e118e6f2fe241cddbb879811167e3ee0417545ef61e3f99cb30bf9d448a073837
-
SSDEEP
12288:Rd9EOmlKGsiry/EmY5ZUDVL3UuFqJk4Sumz:5WKGsi2/EmY5ZUl33MGNz
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
azmlogistics.com - Port:
587 - Username:
[email protected] - Password:
darvey365 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation Temp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 5084 3592 Temp.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3592 Temp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3592 Temp.exe Token: SeDebugPrivilege 5084 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2608 3592 Temp.exe 84 PID 3592 wrote to memory of 2608 3592 Temp.exe 84 PID 3592 wrote to memory of 2608 3592 Temp.exe 84 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 PID 3592 wrote to memory of 5084 3592 Temp.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp.exe"C:\Users\Admin\AppData\Local\Temp\Temp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tzvZaqzVNCrRc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF9C6.tmp"2⤵
- Creates scheduled task(s)
PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD565562149164481fbd8354d58fc12e9d3
SHA1ffdf2178bc69ecaf5edb2a9ab5deabb7ecc34ffe
SHA256e57271fc7a17841a475cb2a8a593f3c7692944850b295e610a4249ebb4adb6ff
SHA5125a6c8a8e84dfd03113481b70605881c2fe8a83c8ff0d181bb865fa60c687aca783522fc282d1b9322a21abcf72a7e1420647a404ee037521a3c45806a981a675