Analysis

  • max time kernel
    132s
  • max time network
    263s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2023 18:07

General

  • Target

    agent.exe

  • Size

    79KB

  • MD5

    d4cd720a666d79b2ab49106c8a9f36f6

  • SHA1

    9098478ffab34d0d9e334dce3cd1769b86be166b

  • SHA256

    e1051e77a093d4fd5c81b43914bff83dce8662374f1c7e4b3a082ce2094870c0

  • SHA512

    586ef5a136c0d1ab918af6745ad8ab2c922fddff4748a495c5e183c9dae608d0cf3dd7c642b8212e63cdc003f93f64f9b3b19c5250468e699e5c07d1c6f84f61

  • SSDEEP

    768:vljP1pmjALZy6prdO7K+tJpN201s9jmHt8N5zg7de8Aaiqk329ZvUDJK9BHXYpoz:vsuHQelfUAauuVU0TKoLOIrdppmdQ

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\agent.exe
    "C:\Users\Admin\AppData\Local\Temp\agent.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4772
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/648-0-0x0000000000510000-0x000000000052A000-memory.dmp

    Filesize

    104KB

  • memory/648-1-0x0000000074C50000-0x0000000075400000-memory.dmp

    Filesize

    7.7MB

  • memory/648-2-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/648-3-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-4-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-6-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-8-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-10-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-12-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-14-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-16-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-18-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-20-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-22-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-24-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-26-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-28-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-30-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-32-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-34-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-36-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-38-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-40-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-42-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-44-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-46-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-48-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-50-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-52-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-54-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-56-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-58-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-60-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-62-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-64-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-66-0x00000000062F0000-0x00000000063B1000-memory.dmp

    Filesize

    772KB

  • memory/648-1054-0x0000000074C50000-0x0000000075400000-memory.dmp

    Filesize

    7.7MB

  • memory/648-1080-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/648-1081-0x0000000005850000-0x0000000005851000-memory.dmp

    Filesize

    4KB

  • memory/648-1082-0x0000000006F30000-0x00000000074D4000-memory.dmp

    Filesize

    5.6MB

  • memory/648-1086-0x0000000074C50000-0x0000000075400000-memory.dmp

    Filesize

    7.7MB

  • memory/4772-1087-0x0000000074C50000-0x0000000075400000-memory.dmp

    Filesize

    7.7MB

  • memory/4772-1088-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4772-1089-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB

  • memory/4772-1090-0x0000000005470000-0x00000000054D6000-memory.dmp

    Filesize

    408KB

  • memory/4772-1097-0x0000000006840000-0x0000000006890000-memory.dmp

    Filesize

    320KB

  • memory/4772-1098-0x0000000006930000-0x00000000069C2000-memory.dmp

    Filesize

    584KB

  • memory/4772-1099-0x00000000068D0000-0x00000000068DA000-memory.dmp

    Filesize

    40KB

  • memory/4772-1100-0x0000000074C50000-0x0000000075400000-memory.dmp

    Filesize

    7.7MB

  • memory/4772-1101-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB