Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 07:39

General

  • Target

    PO09865425670.jar

  • Size

    2.2MB

  • MD5

    0f0b8dea06b24a29885b6b21f82cc087

  • SHA1

    59fb2e978ba606875635ac53a34bfa16d14a7764

  • SHA256

    2a1bc5e1909989a631215b04da3e809b39c855a5af0f695bc22e0aabc478ebfd

  • SHA512

    88e6c1e09eb65878f8820f2999b64309b9b4d8c1b7768421a4da9b4717a005122e005d15674b220bdcea4da2d8a5db8c30d5efce13731b764f55f136193ae7a8

  • SSDEEP

    49152:dSlU0u7xRYSXcqqv5EzaKYGzU0u7xRYSXcqqv5EzaKYGK:dSlE7H5A5ElzE7H5A5ElK

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\PO09865425670.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\hXJVAgyXjf.exe
      C:\Users\Admin\hXJVAgyXjf.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4340
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pIoKZpGQgWVaD.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4320
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIoKZpGQgWVaD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3BE0.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1252
      • C:\Users\Admin\hXJVAgyXjf.exe
        "C:\Users\Admin\hXJVAgyXjf.exe"
        3⤵
        • Executes dropped EXE
        PID:2384
      • C:\Users\Admin\hXJVAgyXjf.exe
        "C:\Users\Admin\hXJVAgyXjf.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:3884
    • C:\Users\Admin\bEskWMBU.exe
      "C:\Users\Admin\bEskWMBU.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pIoKZpGQgWVaD.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:824
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIoKZpGQgWVaD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3BD0.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:3692
      • C:\Users\Admin\bEskWMBU.exe
        "C:\Users\Admin\bEskWMBU.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4300

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          3d086a433708053f9bf9523e1d87a4e8

          SHA1

          b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

          SHA256

          6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

          SHA512

          931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          c37f8f5c442b308c1bf7fe2021e00ab9

          SHA1

          aea0fe34408e836cfacd8c377403585864852bef

          SHA256

          3df4adf84705e5c58f64c96d82bce71991098ddebe0ef8f699e3b8308009f251

          SHA512

          e6fc861f548178afd164cac80ff5d79184d88ba9d58ec3d7b41ba61f9a2ebed66a5657c21fbabbcf68a75f47eec659774b221c3f0b35f3c8eb7f5dd7ffdc694d

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wpihre54.uyk.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmp3BD0.tmp

          Filesize

          1KB

          MD5

          625e4ed865dac665370cbea608902e75

          SHA1

          60353d7dd06a21adbe042aa5ae2f54c4e84f9c83

          SHA256

          900368382b3d317623fd3a255d2dd8d66cc02549c6a19ccdd80e95d25c4085ad

          SHA512

          e7c4e156068f7480828eb476fe9dbeed312eb129fd2b1fe91b4176ef01b9b194090474428205246118111d4dbd7b1d4f7e5749ba87e9644468b950540d4e9818

        • C:\Users\Admin\AppData\Local\Temp\tmp3BE0.tmp

          Filesize

          1KB

          MD5

          625e4ed865dac665370cbea608902e75

          SHA1

          60353d7dd06a21adbe042aa5ae2f54c4e84f9c83

          SHA256

          900368382b3d317623fd3a255d2dd8d66cc02549c6a19ccdd80e95d25c4085ad

          SHA512

          e7c4e156068f7480828eb476fe9dbeed312eb129fd2b1fe91b4176ef01b9b194090474428205246118111d4dbd7b1d4f7e5749ba87e9644468b950540d4e9818

        • C:\Users\Admin\bEskWMBU.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\bEskWMBU.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\bEskWMBU.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\bEskWMBU.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\hXJVAgyXjf.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\hXJVAgyXjf.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\hXJVAgyXjf.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • C:\Users\Admin\hXJVAgyXjf.exe

          Filesize

          1.0MB

          MD5

          ed2572a67d7ca932dac4f4a1672738e9

          SHA1

          7566a290ab1f72c3fb9ab24003565fdc8e4c5183

          SHA256

          28680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b

          SHA512

          ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac

        • memory/824-204-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/824-239-0x0000000007280000-0x00000000072B2000-memory.dmp

          Filesize

          200KB

        • memory/824-262-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/824-241-0x0000000075BA0000-0x0000000075BEC000-memory.dmp

          Filesize

          304KB

        • memory/824-200-0x00000000029D0000-0x0000000002A06000-memory.dmp

          Filesize

          216KB

        • memory/824-201-0x0000000005560000-0x0000000005B88000-memory.dmp

          Filesize

          6.2MB

        • memory/824-268-0x0000000007840000-0x000000000784E000-memory.dmp

          Filesize

          56KB

        • memory/824-270-0x0000000007930000-0x0000000007938000-memory.dmp

          Filesize

          32KB

        • memory/824-209-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/824-267-0x0000000007890000-0x0000000007926000-memory.dmp

          Filesize

          600KB

        • memory/3884-237-0x0000000005780000-0x0000000005790000-memory.dmp

          Filesize

          64KB

        • memory/3884-276-0x0000000005780000-0x0000000005790000-memory.dmp

          Filesize

          64KB

        • memory/4300-277-0x0000000005700000-0x0000000005710000-memory.dmp

          Filesize

          64KB

        • memory/4300-278-0x0000000007050000-0x00000000070A0000-memory.dmp

          Filesize

          320KB

        • memory/4300-238-0x0000000005700000-0x0000000005710000-memory.dmp

          Filesize

          64KB

        • memory/4300-279-0x0000000007270000-0x0000000007432000-memory.dmp

          Filesize

          1.8MB

        • memory/4300-208-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/4320-263-0x000000007F120000-0x000000007F130000-memory.dmp

          Filesize

          64KB

        • memory/4320-264-0x0000000008270000-0x00000000088EA000-memory.dmp

          Filesize

          6.5MB

        • memory/4320-222-0x0000000006550000-0x00000000065B6000-memory.dmp

          Filesize

          408KB

        • memory/4320-236-0x0000000006930000-0x000000000694E000-memory.dmp

          Filesize

          120KB

        • memory/4320-217-0x0000000006240000-0x00000000062A6000-memory.dmp

          Filesize

          408KB

        • memory/4320-207-0x0000000005340000-0x0000000005350000-memory.dmp

          Filesize

          64KB

        • memory/4320-206-0x00000000060A0000-0x00000000060C2000-memory.dmp

          Filesize

          136KB

        • memory/4320-240-0x0000000075BA0000-0x0000000075BEC000-memory.dmp

          Filesize

          304KB

        • memory/4320-269-0x0000000007F70000-0x0000000007F8A000-memory.dmp

          Filesize

          104KB

        • memory/4320-256-0x0000000006ED0000-0x0000000006EEE000-memory.dmp

          Filesize

          120KB

        • memory/4320-266-0x0000000007CA0000-0x0000000007CAA000-memory.dmp

          Filesize

          40KB

        • memory/4320-261-0x0000000005340000-0x0000000005350000-memory.dmp

          Filesize

          64KB

        • memory/4320-265-0x0000000007C30000-0x0000000007C4A000-memory.dmp

          Filesize

          104KB

        • memory/4320-205-0x0000000005340000-0x0000000005350000-memory.dmp

          Filesize

          64KB

        • memory/4340-192-0x00000000078A0000-0x00000000078B0000-memory.dmp

          Filesize

          64KB

        • memory/4340-194-0x00000000085C0000-0x000000000865C000-memory.dmp

          Filesize

          624KB

        • memory/4340-187-0x0000000007620000-0x000000000762A000-memory.dmp

          Filesize

          40KB

        • memory/4340-185-0x00000000078A0000-0x00000000078B0000-memory.dmp

          Filesize

          64KB

        • memory/4340-184-0x0000000007680000-0x0000000007712000-memory.dmp

          Filesize

          584KB

        • memory/4340-183-0x0000000007B90000-0x0000000008134000-memory.dmp

          Filesize

          5.6MB

        • memory/4340-153-0x0000000000690000-0x000000000079E000-memory.dmp

          Filesize

          1.1MB

        • memory/4416-143-0x0000000002D70000-0x0000000002D71000-memory.dmp

          Filesize

          4KB

        • memory/4416-190-0x0000000002D70000-0x0000000002D71000-memory.dmp

          Filesize

          4KB

        • memory/4416-186-0x0000000002D70000-0x0000000002D71000-memory.dmp

          Filesize

          4KB

        • memory/5008-193-0x0000000007A90000-0x0000000007AA0000-memory.dmp

          Filesize

          64KB

        • memory/5008-191-0x0000000007A90000-0x0000000007AA0000-memory.dmp

          Filesize

          64KB