Resubmissions

05/08/2023, 16:30

230805-tz5bhade98 10

05/08/2023, 14:08

230805-rflc6see7w 7

Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 16:30

General

  • Target

    74ffb384c8a3ac7a8ad39faac568e6ff38665af684fc7d4a0661e4f7e563a8bcexe_JC.exe

  • Size

    770KB

  • MD5

    4e04c16ddcd1940a7a58aaf629f5c7f8

  • SHA1

    310f0d39c530cf3b1d4463eb5993e8effb253613

  • SHA256

    74ffb384c8a3ac7a8ad39faac568e6ff38665af684fc7d4a0661e4f7e563a8bc

  • SHA512

    03314ffb0472dd0a06c764761e442e8460a999e03487c536bcfcc521f082cd98e1f0780b4118c8559979f2b835657fef9179a41f20e2265f9f4bc91dc56cdb95

  • SSDEEP

    24576:PAJ8K7G92cCo/69pppNpppppoOQpppNpppppoO:PbK692cikO7O

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74ffb384c8a3ac7a8ad39faac568e6ff38665af684fc7d4a0661e4f7e563a8bcexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\74ffb384c8a3ac7a8ad39faac568e6ff38665af684fc7d4a0661e4f7e563a8bcexe_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UadVvjtvr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7352.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1780
    • C:\Users\Admin\AppData\Local\Temp\74ffb384c8a3ac7a8ad39faac568e6ff38665af684fc7d4a0661e4f7e563a8bcexe_JC.exe
      "{path}"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\74ffb384c8a3ac7a8ad39faac568e6ff38665af684fc7d4a0661e4f7e563a8bcexe_JC.exe.log

    Filesize

    1KB

    MD5

    17573558c4e714f606f997e5157afaac

    SHA1

    13e16e9415ceef429aaf124139671ebeca09ed23

    SHA256

    c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

    SHA512

    f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

  • C:\Users\Admin\AppData\Local\Temp\tmp7352.tmp

    Filesize

    1KB

    MD5

    e4c1f70c6c861ee7d8027b0c2f75e413

    SHA1

    b496d9c349c3c8114937a9382f685d1e69008d9e

    SHA256

    7858f851a5833087e76ed352de5c8d82042277d86cbe29a4f2763e0ac6d8bf3e

    SHA512

    cf389980df03dc61034c6d2950038b963d4cabd140d21e9048f511a78b86ebcc85c1295d7728d522e187e2c7b8c28c1ee20066d1a4b5ca06ee74d93300d0ddaf

  • memory/1184-5-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/1184-11-0x0000000000A60000-0x0000000000AE0000-memory.dmp

    Filesize

    512KB

  • memory/1184-4-0x0000000004C20000-0x0000000004CB2000-memory.dmp

    Filesize

    584KB

  • memory/1184-0-0x0000000000060000-0x0000000000126000-memory.dmp

    Filesize

    792KB

  • memory/1184-6-0x0000000004BC0000-0x0000000004BCA000-memory.dmp

    Filesize

    40KB

  • memory/1184-7-0x0000000004D20000-0x0000000004D76000-memory.dmp

    Filesize

    344KB

  • memory/1184-8-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB

  • memory/1184-9-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/1184-10-0x0000000000500000-0x0000000000514000-memory.dmp

    Filesize

    80KB

  • memory/1184-3-0x0000000005130000-0x00000000056D4000-memory.dmp

    Filesize

    5.6MB

  • memory/1184-12-0x0000000005FE0000-0x0000000006022000-memory.dmp

    Filesize

    264KB

  • memory/1184-1-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB

  • memory/1184-21-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB

  • memory/1184-2-0x0000000004AB0000-0x0000000004B4C000-memory.dmp

    Filesize

    624KB

  • memory/4664-19-0x0000000074F70000-0x0000000075720000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-16-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4664-20-0x0000000005390000-0x00000000053A0000-memory.dmp

    Filesize

    64KB

  • memory/4664-22-0x0000000002DC0000-0x0000000002E26000-memory.dmp

    Filesize

    408KB

  • memory/4664-24-0x0000000006900000-0x0000000006950000-memory.dmp

    Filesize

    320KB