Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 13:32

General

  • Target

    Shipping documents SST2112-250.exe

  • Size

    611KB

  • MD5

    c28f3e323b05bb9f9cf6f72b8b351cd1

  • SHA1

    e1ada7f484af70b5b1d015b0a5e980f2145da995

  • SHA256

    e75bb7380b7386458dfd803bfeab63228ff0e3d27121db683675458f2affbe10

  • SHA512

    ca7474a06a7138d0fce467358c5bd4c054a43a69ae49cdfd16f26685a6336a37cffa2a9cd0d8fe63f45d84d2f7bb3d713b3da6625c33bd80c2192116a4c799f9

  • SSDEEP

    12288:QF8qz6mCW54ReWc/lLsegNd2Pp3iipMPe7iyTEB:QF8qzFCW54RjKlLseg3e9psP

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shipping documents SST2112-250.exe
    "C:\Users\Admin\AppData\Local\Temp\Shipping documents SST2112-250.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kODPQLHS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEA7E.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2748
    • C:\Users\Admin\AppData\Local\Temp\Shipping documents SST2112-250.exe
      "{path}"
      2⤵
        PID:2492
      • C:\Users\Admin\AppData\Local\Temp\Shipping documents SST2112-250.exe
        "{path}"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2876
      • C:\Users\Admin\AppData\Local\Temp\Shipping documents SST2112-250.exe
        "{path}"
        2⤵
          PID:2640

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpEA7E.tmp

        Filesize

        1KB

        MD5

        c41865d17bce51c35c7ff1fb0ffa2bb9

        SHA1

        999782d84468c132f200d81949dc1d2e322e7b60

        SHA256

        8b15d63f59866038fd8bf2edfcee2c79e34c993b8046c5849c25a2f5a9e0ed4a

        SHA512

        e95f6e135cb2edba5bedce2b17cb250d14b8bbe75afa9e40c850507093f20cdbb912e66ac9057d301efe965c4184f8b9a6e0aed9dee2d1c8757678a211b3c905

      • memory/2372-25-0x0000000074950000-0x000000007503E000-memory.dmp

        Filesize

        6.9MB

      • memory/2372-1-0x0000000074950000-0x000000007503E000-memory.dmp

        Filesize

        6.9MB

      • memory/2372-2-0x0000000004B90000-0x0000000004BD0000-memory.dmp

        Filesize

        256KB

      • memory/2372-3-0x00000000003E0000-0x00000000003EC000-memory.dmp

        Filesize

        48KB

      • memory/2372-4-0x0000000074950000-0x000000007503E000-memory.dmp

        Filesize

        6.9MB

      • memory/2372-5-0x0000000004B90000-0x0000000004BD0000-memory.dmp

        Filesize

        256KB

      • memory/2372-6-0x00000000006A0000-0x00000000006FC000-memory.dmp

        Filesize

        368KB

      • memory/2372-7-0x0000000005350000-0x00000000053C8000-memory.dmp

        Filesize

        480KB

      • memory/2372-8-0x0000000000B60000-0x0000000000BA2000-memory.dmp

        Filesize

        264KB

      • memory/2372-0-0x0000000000C00000-0x0000000000CA0000-memory.dmp

        Filesize

        640KB

      • memory/2876-12-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-20-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2876-22-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-16-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-14-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-24-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-13-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2876-26-0x0000000074950000-0x000000007503E000-memory.dmp

        Filesize

        6.9MB

      • memory/2876-27-0x00000000048D0000-0x0000000004910000-memory.dmp

        Filesize

        256KB

      • memory/2876-29-0x0000000074950000-0x000000007503E000-memory.dmp

        Filesize

        6.9MB

      • memory/2876-30-0x00000000048D0000-0x0000000004910000-memory.dmp

        Filesize

        256KB