Analysis

  • max time kernel
    127s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2023, 11:29

General

  • Target

    ORDER LIST_OCTQTRFA00541·PDF.scr.exe

  • Size

    1.7MB

  • MD5

    7938d5d2a40adfcda64c8d5e570082bd

  • SHA1

    66c45c9d9896908d5ea2b4a1725b1366b0a7d045

  • SHA256

    4bc7979e8e63f880e9f4d7be6e59e55c059f5de3377837fcac7d167e3d4fc19f

  • SHA512

    b6f4cf70d840dddb99bcb7eb20214e7d6f7d8ddd8c7f571bfede382cb7891824a5848c0aa98f0819a1c9c91963c09ec10b31c53e9d0d402f48b1345a6ae8ebb3

  • SSDEEP

    24576:YahZEDPxrXXM3Z/QVhCO+KL5LueozFgmxnadvtlrN0i38pOnqjH57HIoSz7713Uw:QDpXXe+Vh5NSe0zxnkV0BpOqjZ7ez78y

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER LIST_OCTQTRFA00541·PDF.scr.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER LIST_OCTQTRFA00541·PDF.scr.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1728-10-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1728-11-0x0000000005C10000-0x00000000061B4000-memory.dmp

    Filesize

    5.6MB

  • memory/1728-2-0x0000000004DD0000-0x0000000004E62000-memory.dmp

    Filesize

    584KB

  • memory/1728-3-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1728-4-0x0000000004E90000-0x0000000004FEA000-memory.dmp

    Filesize

    1.4MB

  • memory/1728-5-0x00000000054C0000-0x000000000551C000-memory.dmp

    Filesize

    368KB

  • memory/1728-6-0x0000000005200000-0x0000000005244000-memory.dmp

    Filesize

    272KB

  • memory/1728-7-0x0000000005520000-0x0000000005562000-memory.dmp

    Filesize

    264KB

  • memory/1728-8-0x0000000005260000-0x00000000052AC000-memory.dmp

    Filesize

    304KB

  • memory/1728-9-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/1728-1-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/1728-15-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/1728-0-0x0000000000290000-0x000000000044C000-memory.dmp

    Filesize

    1.7MB

  • memory/2272-12-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2272-14-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/2272-16-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/2272-17-0x0000000004D90000-0x0000000004DF6000-memory.dmp

    Filesize

    408KB

  • memory/2272-18-0x0000000005C10000-0x0000000005C60000-memory.dmp

    Filesize

    320KB

  • memory/2272-19-0x0000000005EC0000-0x0000000005ECA000-memory.dmp

    Filesize

    40KB

  • memory/2272-20-0x0000000074CB0000-0x0000000075460000-memory.dmp

    Filesize

    7.7MB

  • memory/2272-21-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB