Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2023 13:04

General

  • Target

    Enquiry E0359977A-9122.exe

  • Size

    288KB

  • MD5

    86c3db80eaa437e32bc3534273c8482a

  • SHA1

    7b80bab03acddf1fe65c088183736f1922ad556b

  • SHA256

    0cc8d93630b4068b0b72119c061925754274478463014d05696a34603f88eaf7

  • SHA512

    c66c0cfec2cc020e26e917e87da4262815604dee7789fc09cff12952412fa619b9a78970c68e487b23fa22b19737f1c80289f17cf229c4573bf39c1498f8bbf5

  • SSDEEP

    6144:JYa68Xkr+X/z2VKZEf2KYg81OroHK6jkxwusUB85eg+x6:JYOkraCKEf2Kqk6YqdUB8s6

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Enquiry E0359977A-9122.exe
    "C:\Users\Admin\AppData\Local\Temp\Enquiry E0359977A-9122.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\Enquiry E0359977A-9122.exe
      "C:\Users\Admin\AppData\Local\Temp\Enquiry E0359977A-9122.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nstD057.tmp\bwwrusln.dll

    Filesize

    38KB

    MD5

    5362823a43b40b26ab8fd868c734a64f

    SHA1

    1a87bf3f970ba9a3a26c6438ef48e0dccae8ca80

    SHA256

    4731f659b5585ae5237c763671253f0e90c68766868e83e5d5f2b71d29b5f19e

    SHA512

    6a7d95b79c8b43bdae50c320d94f8a83e07d46f483de45090b9b1ed552b5aedd9770ebfa3280f78627a2b73610e20235fc02692fd32d90356bb95cfb707fabf1

  • memory/1280-140-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1280-141-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1280-142-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1280-143-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1280-144-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-145-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-146-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-147-0x0000000004A60000-0x0000000005004000-memory.dmp

    Filesize

    5.6MB

  • memory/1280-148-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-149-0x00000000049D0000-0x0000000004A36000-memory.dmp

    Filesize

    408KB

  • memory/1280-150-0x0000000005B70000-0x0000000005BC0000-memory.dmp

    Filesize

    320KB

  • memory/1280-151-0x0000000005BE0000-0x0000000005DA2000-memory.dmp

    Filesize

    1.8MB

  • memory/1280-152-0x0000000005DB0000-0x0000000005E42000-memory.dmp

    Filesize

    584KB

  • memory/1280-153-0x0000000005FA0000-0x0000000005FAA000-memory.dmp

    Filesize

    40KB

  • memory/1280-155-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-156-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-157-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1280-158-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB