Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 20:27

General

  • Target

    ca63861d243fe426a35ed766b47557c6249f9a8dba8ee1cc737eade5904aa4c4.exe

  • Size

    299KB

  • MD5

    df4f4d8f3a20196e3cbeddfad102cfa5

  • SHA1

    5f4fb1c18bc0a0d86bd34d4d1ebf7d9a8029671a

  • SHA256

    ca63861d243fe426a35ed766b47557c6249f9a8dba8ee1cc737eade5904aa4c4

  • SHA512

    bbfa37e4f383c8d7612e3210a6376f9fef3089849fe6d13e0931d0b36cef7f4f718235c4d13becc73265644a42393280c3c62043eab5e462af4514f3db1537c8

  • SSDEEP

    6144:OYa64XACWHjqgLpPR9aalvzGZeo+PnSPM0Uu6bQ3lmGHb4NVPi6:OYSXxW995ZWe/PnSPpp1TMjPp

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca63861d243fe426a35ed766b47557c6249f9a8dba8ee1cc737eade5904aa4c4.exe
    "C:\Users\Admin\AppData\Local\Temp\ca63861d243fe426a35ed766b47557c6249f9a8dba8ee1cc737eade5904aa4c4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\ca63861d243fe426a35ed766b47557c6249f9a8dba8ee1cc737eade5904aa4c4.exe
      "C:\Users\Admin\AppData\Local\Temp\ca63861d243fe426a35ed766b47557c6249f9a8dba8ee1cc737eade5904aa4c4.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nss74BA.tmp\afxcyprzss.dll

    Filesize

    44KB

    MD5

    9cdfa44380c93bbf0dbaee409751fa2f

    SHA1

    765a4d2323c77b0eb3c7b8e4b46b283f379896a2

    SHA256

    8ccf4c5f1e3f8dadba1376cc23e1bee1675b59c559f709f935c26d4967fa26ff

    SHA512

    c0080167d3b9beca447e7c0e71a23f48fcaacb60253632a1eff99c5d5b9b3f3111a35177af18f94ddcf2e6c8b1231196e1b3b378fda3b4ab43e31d48469bf8db

  • memory/452-140-0x0000000002320000-0x0000000002322000-memory.dmp

    Filesize

    8KB

  • memory/4112-141-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4112-142-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4112-144-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4112-145-0x0000000004B40000-0x00000000050E4000-memory.dmp

    Filesize

    5.6MB

  • memory/4112-146-0x00000000049F0000-0x0000000004A56000-memory.dmp

    Filesize

    408KB

  • memory/4112-147-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4112-148-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-150-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-149-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-151-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-152-0x0000000005CD0000-0x0000000005D20000-memory.dmp

    Filesize

    320KB

  • memory/4112-153-0x0000000005D40000-0x0000000005F02000-memory.dmp

    Filesize

    1.8MB

  • memory/4112-154-0x0000000005F10000-0x0000000005FA2000-memory.dmp

    Filesize

    584KB

  • memory/4112-155-0x0000000006010000-0x000000000601A000-memory.dmp

    Filesize

    40KB

  • memory/4112-157-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-158-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-159-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4112-160-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB