Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 01:08
Static task
static1
Behavioral task
behavioral1
Sample
420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe
Resource
win10v2004-20230915-en
General
-
Target
420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe
-
Size
12KB
-
MD5
1eef9f1c50a5362d4ff555b6cc5bc5df
-
SHA1
caa4099e942052634cea6fc2866d9652f09cf546
-
SHA256
420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867
-
SHA512
56c41cf987ba22ddac2cac9ef10e3dbadf2abd99ca0ed3510883d532cc5d1625ce50426308b8e91bd20645e3812074b31b977976646d751621dd18a92b877218
-
SSDEEP
192:nlv0pHLdF1bvM+A4tLHwpTxHR95w0J1dZdckF+syKtieOv:d+Lxbk+A4tTyFSvsyuDO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 BIN.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3172 set thread context of 4320 3172 BIN.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2076 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe Token: SeDebugPrivilege 3172 BIN.exe Token: SeDebugPrivilege 4320 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2076 wrote to memory of 3172 2076 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe 86 PID 2076 wrote to memory of 3172 2076 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe 86 PID 2076 wrote to memory of 3172 2076 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe 86 PID 2076 wrote to memory of 2296 2076 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe 87 PID 2076 wrote to memory of 2296 2076 420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe 87 PID 2296 wrote to memory of 3692 2296 cmd.exe 89 PID 2296 wrote to memory of 3692 2296 cmd.exe 89 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 PID 3172 wrote to memory of 4320 3172 BIN.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe"C:\Users\Admin\AppData\Local\Temp\420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\BIN.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\BIN.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\420a2c200fde9d62bc040616edd62949aec77d6e39bf864602f584792fc8e867.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 13⤵PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD546bb9de6f56bf249a4e78e2a5068e425
SHA197c7b74d4ac79ee23884e69c61c4016ad35eaeab
SHA2563a4b1e3cc1e298ce7440831ab41ef87b16e219175881350395564b81359889d6
SHA512150bc10ee344a0f84cb6e8e3208640bd0557e4ef3c258f00a79faa0a370cc3fc6643e1a606727260ebc3d649ef89e917c51d4ccdd339aa286afd512e1fa9f065
-
Filesize
53KB
MD546bb9de6f56bf249a4e78e2a5068e425
SHA197c7b74d4ac79ee23884e69c61c4016ad35eaeab
SHA2563a4b1e3cc1e298ce7440831ab41ef87b16e219175881350395564b81359889d6
SHA512150bc10ee344a0f84cb6e8e3208640bd0557e4ef3c258f00a79faa0a370cc3fc6643e1a606727260ebc3d649ef89e917c51d4ccdd339aa286afd512e1fa9f065
-
Filesize
53KB
MD546bb9de6f56bf249a4e78e2a5068e425
SHA197c7b74d4ac79ee23884e69c61c4016ad35eaeab
SHA2563a4b1e3cc1e298ce7440831ab41ef87b16e219175881350395564b81359889d6
SHA512150bc10ee344a0f84cb6e8e3208640bd0557e4ef3c258f00a79faa0a370cc3fc6643e1a606727260ebc3d649ef89e917c51d4ccdd339aa286afd512e1fa9f065