Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 18:21

General

  • Target

    controvoke2.1.exe

  • Size

    411KB

  • MD5

    3c235c238a38a7dc10d78f0ba080587f

  • SHA1

    c3793be872f2621f25aa858391657967a749eed2

  • SHA256

    11e6f0a94e14abfea4bdbde34de5d22b2428775f23a5ecf32c0382d9b4e23e0f

  • SHA512

    180ac1fb17e1909041897bed7ca9301c2a4b75a251be815b6ff215e05a37aee85685fbc8b59552f956fd97a9f25ab658a4584f777b26f72caa3291c79e340959

  • SSDEEP

    12288:2YdrUBonHv0ExODZoyXqqT4yX8TpiImGVeBsg:2YFUo/xmZMbMWVlg

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\controvoke2.1.exe
    "C:\Users\Admin\AppData\Local\Temp\controvoke2.1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe
      "C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe
        "C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\pptve.eqc

          Filesize

          336KB

          MD5

          9eb099e5c928e2be363652590e021ad1

          SHA1

          36d6add7395bc509737ae10a0d0ae1b9e33eaf71

          SHA256

          fc5242d4904704be57768e996fe494ace2aa6d933138f5acf6841a36f429504d

          SHA512

          3ba00ce003a70a6c31ebdd6da73886a09e72cea2b2d3bde7d8280f714ff0103c90eaecbf0251c2f42532ae7065c92f766f4776f60e8037c3117bd3765a6318d3

        • C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe

          Filesize

          180KB

          MD5

          94b2ea1a3022b923e5af0eb721b41f83

          SHA1

          babcaa8f79d14fda035808a372101d6a3d370789

          SHA256

          ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf

          SHA512

          16a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e

        • C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe

          Filesize

          180KB

          MD5

          94b2ea1a3022b923e5af0eb721b41f83

          SHA1

          babcaa8f79d14fda035808a372101d6a3d370789

          SHA256

          ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf

          SHA512

          16a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e

        • C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe

          Filesize

          180KB

          MD5

          94b2ea1a3022b923e5af0eb721b41f83

          SHA1

          babcaa8f79d14fda035808a372101d6a3d370789

          SHA256

          ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf

          SHA512

          16a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e

        • \Users\Admin\AppData\Local\Temp\zuwafjld.exe

          Filesize

          180KB

          MD5

          94b2ea1a3022b923e5af0eb721b41f83

          SHA1

          babcaa8f79d14fda035808a372101d6a3d370789

          SHA256

          ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf

          SHA512

          16a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e

        • \Users\Admin\AppData\Local\Temp\zuwafjld.exe

          Filesize

          180KB

          MD5

          94b2ea1a3022b923e5af0eb721b41f83

          SHA1

          babcaa8f79d14fda035808a372101d6a3d370789

          SHA256

          ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf

          SHA512

          16a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e

        • memory/1868-14-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/1868-10-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/1868-15-0x0000000000400000-0x0000000000453000-memory.dmp

          Filesize

          332KB

        • memory/1868-17-0x0000000074940000-0x000000007502E000-memory.dmp

          Filesize

          6.9MB

        • memory/1868-16-0x0000000004450000-0x0000000004492000-memory.dmp

          Filesize

          264KB

        • memory/1868-18-0x00000000044C0000-0x0000000004500000-memory.dmp

          Filesize

          256KB

        • memory/1868-19-0x00000000044C0000-0x0000000004500000-memory.dmp

          Filesize

          256KB

        • memory/1868-20-0x00000000044C0000-0x0000000004500000-memory.dmp

          Filesize

          256KB

        • memory/1868-21-0x0000000074940000-0x000000007502E000-memory.dmp

          Filesize

          6.9MB

        • memory/3000-6-0x00000000001D0000-0x00000000001D2000-memory.dmp

          Filesize

          8KB