Analysis

  • max time kernel
    57s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2023 09:28

General

  • Target

    Order # CCI-1260584.exe

  • Size

    724KB

  • MD5

    89b3a3650105f363fa99624f7c122b7e

  • SHA1

    896232e9d46e96fb725027380cc56cc73ae3ace9

  • SHA256

    816dcc8bb5070ed2db687bdb064a383c946c8183f5e0c089f2453653be8a3086

  • SHA512

    a3a07c7679dc90b78d4a963fb750e2e72003ab119ff774a99db47483bbfcda1b53cdd9b205da0b6feac29503828b7b1dda3c28e9fbfdc451327ffbc8faa5ff4c

  • SSDEEP

    12288:60+J/M+Jhewx/NscEQ+vgXK1HsaP2XigKw/HDrnTfehVwWRkAUqT6c2sKoRjpt6s:M/thewlqB6p8W/jjTf6V/Ul9sK0t6LoJ

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Order # CCI-1260584.exe
    "C:\Users\Admin\AppData\Local\Temp\Order # CCI-1260584.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sFAvJK.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:676
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sFAvJK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB646.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:700
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1216
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpB646.tmp

      Filesize

      1KB

      MD5

      048e3e99840a66eefeb36d3a38a2b83f

      SHA1

      8d4efefc530376a469e45f7595728ea8e3ea4445

      SHA256

      b8a30f70a04042f6b94c9ab2a1646aa24d2a83b7b40b8e6cda4bbfa2c6017cbc

      SHA512

      f0925b8ba6efb626e4d7c979da4d97fd309a8d9ba3c7c4675fa746dc8ee65edf071efe77fadb27bdb923c683cf7207a2187ddbe772eb97090eba8363392ead6e

    • memory/676-78-0x0000000002650000-0x0000000002690000-memory.dmp

      Filesize

      256KB

    • memory/1260-55-0x0000000004870000-0x00000000048B0000-memory.dmp

      Filesize

      256KB

    • memory/1260-56-0x0000000000750000-0x0000000000762000-memory.dmp

      Filesize

      72KB

    • memory/1260-57-0x0000000004870000-0x00000000048B0000-memory.dmp

      Filesize

      256KB

    • memory/1260-58-0x0000000000900000-0x000000000090C000-memory.dmp

      Filesize

      48KB

    • memory/1260-59-0x0000000005250000-0x00000000052BC000-memory.dmp

      Filesize

      432KB

    • memory/1260-65-0x0000000002160000-0x0000000002192000-memory.dmp

      Filesize

      200KB

    • memory/1260-54-0x0000000000960000-0x0000000000A1A000-memory.dmp

      Filesize

      744KB

    • memory/1680-68-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-71-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-70-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1680-73-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-77-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-75-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1680-69-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB