Analysis

  • max time kernel
    30s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2023, 01:16

General

  • Target

    1214fcf60b88a08f596efec828f1ea8744b30aa6ff141c8a98f45dc6b2a51658.exe

  • Size

    137KB

  • MD5

    3f44e6cb225efe5b640353f568a99acd

  • SHA1

    89bbcdf4a0c1d210a656b007ae3c754367ba3bc1

  • SHA256

    1214fcf60b88a08f596efec828f1ea8744b30aa6ff141c8a98f45dc6b2a51658

  • SHA512

    7765f7e653c55e4d8034df89dd7584fc787572e3e7d5a38fd5744f95b435598707e26feedb7a0a8d9fd48404598cd7857d52bcfed1b57434acd6bc5428accd7c

  • SSDEEP

    3072:duxPI6JmMvHaXQtMJo+rEG7mAeedlZk52/Id4r85fwH:dgSQcoHG7R9Id4c4

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1214fcf60b88a08f596efec828f1ea8744b30aa6ff141c8a98f45dc6b2a51658.exe
    "C:\Users\Admin\AppData\Local\Temp\1214fcf60b88a08f596efec828f1ea8744b30aa6ff141c8a98f45dc6b2a51658.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\Ycgdqpptljseil.exe
      "C:\Users\Admin\AppData\Local\Temp\Ycgdqpptljseil.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: SetClipboardViewer
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:1604
    • C:\Users\Admin\AppData\Local\Temp\Ciko.exe
      "C:\Users\Admin\AppData\Local\Temp\Ciko.exe"
      2⤵
      • Executes dropped EXE
      PID:764

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Ciko.exe

          Filesize

          76KB

          MD5

          6741d00c206f685140fd9cd0957aaaa8

          SHA1

          8e2da1453a6001aef807661db6940b1703846890

          SHA256

          8c21274f725299022fbf415925210da65702198913c4713dfe5dda09ceb2d38a

          SHA512

          9ea9656b2a54d7f3482d4625d52aa0c51e788ece799de5bb35e821efe138cce49e0d091e4ba683ef49d727d01ff9b912f58f5a96dac3f57441709318c364f527

        • C:\Users\Admin\AppData\Local\Temp\Ciko.exe

          Filesize

          76KB

          MD5

          6741d00c206f685140fd9cd0957aaaa8

          SHA1

          8e2da1453a6001aef807661db6940b1703846890

          SHA256

          8c21274f725299022fbf415925210da65702198913c4713dfe5dda09ceb2d38a

          SHA512

          9ea9656b2a54d7f3482d4625d52aa0c51e788ece799de5bb35e821efe138cce49e0d091e4ba683ef49d727d01ff9b912f58f5a96dac3f57441709318c364f527

        • C:\Users\Admin\AppData\Local\Temp\Ycgdqpptljseil.exe

          Filesize

          167KB

          MD5

          194aa88d7a44a347437300b8ee27dedc

          SHA1

          478c1efd14f29309eb64c40f15eb87ae9ca3cbf0

          SHA256

          92ac67242a69e4bdc5136ced3d0a07637132f3e7fde7508f14a23357743e457a

          SHA512

          172bcfdd9717839057aecd43e753c9cf0de98c58285f5f34aaa9bd3f048e3f2a0adaec29ec6f8d003ef11d83cc41263eee8157cd163e6c1fb2d37f621ae7bbbc

        • C:\Users\Admin\AppData\Local\Temp\Ycgdqpptljseil.exe

          Filesize

          167KB

          MD5

          194aa88d7a44a347437300b8ee27dedc

          SHA1

          478c1efd14f29309eb64c40f15eb87ae9ca3cbf0

          SHA256

          92ac67242a69e4bdc5136ced3d0a07637132f3e7fde7508f14a23357743e457a

          SHA512

          172bcfdd9717839057aecd43e753c9cf0de98c58285f5f34aaa9bd3f048e3f2a0adaec29ec6f8d003ef11d83cc41263eee8157cd163e6c1fb2d37f621ae7bbbc

        • \Users\Admin\AppData\Local\Temp\Ciko.exe

          Filesize

          76KB

          MD5

          6741d00c206f685140fd9cd0957aaaa8

          SHA1

          8e2da1453a6001aef807661db6940b1703846890

          SHA256

          8c21274f725299022fbf415925210da65702198913c4713dfe5dda09ceb2d38a

          SHA512

          9ea9656b2a54d7f3482d4625d52aa0c51e788ece799de5bb35e821efe138cce49e0d091e4ba683ef49d727d01ff9b912f58f5a96dac3f57441709318c364f527

        • \Users\Admin\AppData\Local\Temp\Ycgdqpptljseil.exe

          Filesize

          167KB

          MD5

          194aa88d7a44a347437300b8ee27dedc

          SHA1

          478c1efd14f29309eb64c40f15eb87ae9ca3cbf0

          SHA256

          92ac67242a69e4bdc5136ced3d0a07637132f3e7fde7508f14a23357743e457a

          SHA512

          172bcfdd9717839057aecd43e753c9cf0de98c58285f5f34aaa9bd3f048e3f2a0adaec29ec6f8d003ef11d83cc41263eee8157cd163e6c1fb2d37f621ae7bbbc

        • memory/764-71-0x0000000000B50000-0x0000000000B68000-memory.dmp

          Filesize

          96KB

        • memory/764-72-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/764-96-0x0000000004B30000-0x0000000004B70000-memory.dmp

          Filesize

          256KB

        • memory/1600-54-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1600-55-0x0000000004AD0000-0x0000000004B10000-memory.dmp

          Filesize

          256KB

        • memory/1604-70-0x0000000000F60000-0x0000000000F90000-memory.dmp

          Filesize

          192KB

        • memory/1604-97-0x0000000000EC0000-0x0000000000F00000-memory.dmp

          Filesize

          256KB