Analysis

  • max time kernel
    119s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 12:09

General

  • Target

    e-dekont_html.exe

  • Size

    620KB

  • MD5

    c82c075375552caf61f526a379125a21

  • SHA1

    52ca0075bb3e8aefd8c614d6b1801b08e832e7b7

  • SHA256

    a84d6a658ddfea2bf155df47943d616f4dce09d55bf7abc2eac1f1485be7bb48

  • SHA512

    e7e516c74a23d65315b1ab62ea7b559cde29c4ee5b866bd8ab35844f535b55a1bf52ece8ec525152eadaef5333bfaab06e5898c24fda5e44539e88ce14a8d951

  • SSDEEP

    12288:/AfDuHOXq2o6dQ0kGSI8qUfSpcgYKhLURBX+3g2wN/axkOUWahznI9l8tj70:/gU2fS0q9qpc5UUTXVmxbUWa30

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe
    "C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2612
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PphstXaeH.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2608
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PphstXaeH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp562B.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2516
    • C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe
      "C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp562B.tmp

    Filesize

    1KB

    MD5

    8f93ae0d3066c85b8544d16819a19a3b

    SHA1

    036e586db9508c382eae1cda48b7b060d9c91150

    SHA256

    98eec04ffd4519ce35a1216b80071d4d628a1184fdbd9b1c9d19bfd6f7ad09d8

    SHA512

    2f98fc9a3097bfbea0bab9fbbd10c857b860ef2f628be26751ae4b0369e9c00a30fbc73a8320dfa82200670c6fc2c7b7f0736e020583f0480742ee84d99b3eb8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VI0GPWA8BYDXDQRHKMM9.temp

    Filesize

    7KB

    MD5

    e69b2e6c8c13027069fde281920aff60

    SHA1

    22ff79b3795d5ebf30ea5d5754cffc4da1bb6014

    SHA256

    17db9a11ed01576bd4a0ec16748f67b0fd00913a0eae23ba1ef457efd0817d1d

    SHA512

    8ac49148bcb9f7433df0a0416d19b2a0521648169b6f29f30a8660709bfb27cfda3a0b8ecbbb283b8752e9771149970737edb8a207545aa6b13fe56e45c87ce5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    e69b2e6c8c13027069fde281920aff60

    SHA1

    22ff79b3795d5ebf30ea5d5754cffc4da1bb6014

    SHA256

    17db9a11ed01576bd4a0ec16748f67b0fd00913a0eae23ba1ef457efd0817d1d

    SHA512

    8ac49148bcb9f7433df0a0416d19b2a0521648169b6f29f30a8660709bfb27cfda3a0b8ecbbb283b8752e9771149970737edb8a207545aa6b13fe56e45c87ce5

  • memory/2480-28-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2480-39-0x0000000004060000-0x00000000040A0000-memory.dmp

    Filesize

    256KB

  • memory/2480-32-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2480-30-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2480-42-0x0000000074E40000-0x000000007552E000-memory.dmp

    Filesize

    6.9MB

  • memory/2480-46-0x0000000074E40000-0x000000007552E000-memory.dmp

    Filesize

    6.9MB

  • memory/2480-26-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2480-24-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2480-20-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2480-21-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2480-22-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2580-4-0x0000000074E40000-0x000000007552E000-memory.dmp

    Filesize

    6.9MB

  • memory/2580-2-0x00000000041D0000-0x0000000004210000-memory.dmp

    Filesize

    256KB

  • memory/2580-0-0x0000000010870000-0x0000000010912000-memory.dmp

    Filesize

    648KB

  • memory/2580-3-0x0000000000230000-0x0000000000248000-memory.dmp

    Filesize

    96KB

  • memory/2580-5-0x00000000041D0000-0x0000000004210000-memory.dmp

    Filesize

    256KB

  • memory/2580-33-0x0000000074E40000-0x000000007552E000-memory.dmp

    Filesize

    6.9MB

  • memory/2580-7-0x0000000005B90000-0x0000000005BFA000-memory.dmp

    Filesize

    424KB

  • memory/2580-6-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/2580-1-0x0000000074E40000-0x000000007552E000-memory.dmp

    Filesize

    6.9MB

  • memory/2608-45-0x000000006EF20000-0x000000006F4CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2608-38-0x000000006EF20000-0x000000006F4CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2608-36-0x00000000002D0000-0x0000000000310000-memory.dmp

    Filesize

    256KB

  • memory/2608-35-0x000000006EF20000-0x000000006F4CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2612-34-0x000000006EF20000-0x000000006F4CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2612-40-0x00000000022D0000-0x0000000002310000-memory.dmp

    Filesize

    256KB

  • memory/2612-41-0x00000000022D0000-0x0000000002310000-memory.dmp

    Filesize

    256KB

  • memory/2612-37-0x000000006EF20000-0x000000006F4CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2612-43-0x00000000022D0000-0x0000000002310000-memory.dmp

    Filesize

    256KB

  • memory/2612-44-0x000000006EF20000-0x000000006F4CB000-memory.dmp

    Filesize

    5.7MB