Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 13:19

General

  • Target

    1036-11-0x0000000006AA0000-0x0000000006AE2000-memory.exe

  • Size

    264KB

  • MD5

    b472ace8481e0f4f18be9c8d2836faae

  • SHA1

    4776ddf340c51f5e46d24599679b473424669d4b

  • SHA256

    e7e40f087ab101345dc6e420be57371c0bb23001edd0f6b7abfca53de5fed58f

  • SHA512

    d3f7feed21597ef58aedfb6e14d4f780c2b2babca0780150ab231fc2625c1257d12856c244a30a65756c9eaaae8f69a7836ac8021368c55f39888379e4ed5827

  • SSDEEP

    1536:ylR/Dn+tuzIhly64XU5Dzrqwrr1wRDh+GkJLCL9RdSdNm4606Bskcp1BVYmYCb3r:O/TKPsQXrRbLC5mdNmf06B4VYEAzY

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1036-11-0x0000000006AA0000-0x0000000006AE2000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1036-11-0x0000000006AA0000-0x0000000006AE2000-memory.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:4752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4752-1-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/4752-0-0x00000000003F0000-0x0000000000432000-memory.dmp

          Filesize

          264KB

        • memory/4752-2-0x00000000053B0000-0x0000000005954000-memory.dmp

          Filesize

          5.6MB

        • memory/4752-3-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB

        • memory/4752-4-0x0000000004F70000-0x0000000004FD6000-memory.dmp

          Filesize

          408KB

        • memory/4752-6-0x0000000006600000-0x0000000006650000-memory.dmp

          Filesize

          320KB

        • memory/4752-7-0x00000000066F0000-0x0000000006782000-memory.dmp

          Filesize

          584KB

        • memory/4752-8-0x0000000006670000-0x000000000667A000-memory.dmp

          Filesize

          40KB

        • memory/4752-9-0x00000000746A0000-0x0000000074E50000-memory.dmp

          Filesize

          7.7MB

        • memory/4752-10-0x0000000004DF0000-0x0000000004E00000-memory.dmp

          Filesize

          64KB