Analysis

  • max time kernel
    136s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 12:25

General

  • Target

    3811e99f207240971d637064c8796e69.exe

  • Size

    355KB

  • MD5

    3811e99f207240971d637064c8796e69

  • SHA1

    c69549b08e786f767e8474e201b08e1d324f1ca1

  • SHA256

    4956c7edc7eb8765ab322d700fb15d2d5132f1f54fec7c1a46b6e7da78e81b5c

  • SHA512

    012cd19102e841b3df5de816853ff156c0a33bc6eedfef131656f3bced27e4150ee8c46bb9abbe8d37ed145ca281fd8f012062c7e65f1b44e5b051219791074a

  • SSDEEP

    6144:gky3ziMeSMLYa4phyX8s2s8xkLVNogLXax1vj5:l2uMeSMLCbsGkLVNTXW

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3811e99f207240971d637064c8796e69.exe
    "C:\Users\Admin\AppData\Local\Temp\3811e99f207240971d637064c8796e69.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1884-10-0x00000000059D0000-0x0000000005A36000-memory.dmp

    Filesize

    408KB

  • memory/1884-11-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1884-15-0x0000000005AA0000-0x0000000005AB0000-memory.dmp

    Filesize

    64KB

  • memory/1884-14-0x0000000006A90000-0x0000000006A9A000-memory.dmp

    Filesize

    40KB

  • memory/1884-4-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1884-13-0x0000000006B20000-0x0000000006BB2000-memory.dmp

    Filesize

    584KB

  • memory/1884-12-0x0000000006A30000-0x0000000006A80000-memory.dmp

    Filesize

    320KB

  • memory/1884-9-0x0000000005AA0000-0x0000000005AB0000-memory.dmp

    Filesize

    64KB

  • memory/1884-7-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1884-8-0x0000000006080000-0x0000000006624000-memory.dmp

    Filesize

    5.6MB

  • memory/3860-0-0x000002147C340000-0x000002147C398000-memory.dmp

    Filesize

    352KB

  • memory/3860-1-0x00007FFFA34F0000-0x00007FFFA3FB1000-memory.dmp

    Filesize

    10.8MB

  • memory/3860-6-0x00007FFFA34F0000-0x00007FFFA3FB1000-memory.dmp

    Filesize

    10.8MB

  • memory/3860-3-0x000002147DEF0000-0x000002147DEFA000-memory.dmp

    Filesize

    40KB

  • memory/3860-2-0x000002147E840000-0x000002147E850000-memory.dmp

    Filesize

    64KB