Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2023, 08:02

General

  • Target

    Zeki Hidrolik Fiyat talebi_Ticari liste.exe

  • Size

    700KB

  • MD5

    02b8fd7c6ea136ebfb47b2ff2f0d1a72

  • SHA1

    370cdb58d4e273b35f6e38ffc694473143cf9395

  • SHA256

    d4be953d9e9504303622fe8c83eb835c8dc6ce07a051ad145a4b419cab8b8566

  • SHA512

    bedc52d810473ec5174f449a2eba39f4682d6707ec70649a0e48d1ed8bce1bba60f541d52f014e2591f6487db07b4624eaac7ab7cd64f1ec6504bd2df3d522ae

  • SSDEEP

    12288:8ZFpdY/Rmisoh6VO5W/eTraTuiSn1QbFrdn:oasoT5W/I21S1QbFrR

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eprl.pt
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    6EO##P9jkTTY

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zeki Hidrolik Fiyat talebi_Ticari liste.exe
    "C:\Users\Admin\AppData\Local\Temp\Zeki Hidrolik Fiyat talebi_Ticari liste.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      "C:\Users\Admin\AppData\Local\Temp\Zeki Hidrolik Fiyat talebi_Ticari liste.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsj7206.tmp\System.dll

          Filesize

          11KB

          MD5

          b8992e497d57001ddf100f9c397fcef5

          SHA1

          e26ddf101a2ec5027975d2909306457c6f61cfbd

          SHA256

          98bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b

          SHA512

          8823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c

        • \Users\Admin\AppData\Local\Temp\nsj7206.tmp\System.dll

          Filesize

          11KB

          MD5

          b8992e497d57001ddf100f9c397fcef5

          SHA1

          e26ddf101a2ec5027975d2909306457c6f61cfbd

          SHA256

          98bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b

          SHA512

          8823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c

        • \Users\Admin\AppData\Local\Temp\nsj7206.tmp\System.dll

          Filesize

          11KB

          MD5

          b8992e497d57001ddf100f9c397fcef5

          SHA1

          e26ddf101a2ec5027975d2909306457c6f61cfbd

          SHA256

          98bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b

          SHA512

          8823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c

        • memory/2464-17-0x0000000076E90000-0x0000000077039000-memory.dmp

          Filesize

          1.7MB

        • memory/2464-18-0x0000000077080000-0x0000000077156000-memory.dmp

          Filesize

          856KB

        • memory/2464-19-0x0000000010000000-0x0000000010006000-memory.dmp

          Filesize

          24KB

        • memory/2732-20-0x0000000076E90000-0x0000000077039000-memory.dmp

          Filesize

          1.7MB

        • memory/2732-42-0x0000000072410000-0x0000000073472000-memory.dmp

          Filesize

          16.4MB

        • memory/2732-43-0x0000000000990000-0x00000000047A4000-memory.dmp

          Filesize

          62.1MB

        • memory/2732-44-0x0000000072410000-0x0000000072454000-memory.dmp

          Filesize

          272KB

        • memory/2732-45-0x0000000071D20000-0x000000007240E000-memory.dmp

          Filesize

          6.9MB

        • memory/2732-47-0x00000000373E0000-0x0000000037420000-memory.dmp

          Filesize

          256KB

        • memory/2732-48-0x0000000071D20000-0x000000007240E000-memory.dmp

          Filesize

          6.9MB

        • memory/2732-50-0x00000000373E0000-0x0000000037420000-memory.dmp

          Filesize

          256KB