Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 16:45

General

  • Target

    invoice.exe

  • Size

    728KB

  • MD5

    2a62b3b50dc20a361eaa8956ca312a81

  • SHA1

    835dce3de7679964b51f14c1d7efeac5e795fbf5

  • SHA256

    4fb354ecdf9b230311b7b6bc60b1016f5f17653a1653e1c6fa1fbbbc92a08a30

  • SHA512

    1356c26448e0f1ddd68e8e0b5c4bce21cf26454f15a87e493b47c15b682e9af915d09c465d68a826dc0f5cf5d6d931e135fe312624f4ede011f69212e9bbdd08

  • SSDEEP

    12288:oXkNp2iNkuPF33L1BL4yE8M37kEGMj9WHpP92tMRdIrHVTlcZxB8Dbya24vA:fp1l5b1et8iGMj9WJPIMRUVT6ZU44v

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\invoice.exe
    "C:\Users\Admin\AppData\Local\Temp\invoice.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zcbemJ.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1976
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zcbemJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8BEB.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2076
    • C:\Users\Admin\AppData\Local\Temp\invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\invoice.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2720

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp8BEB.tmp

          Filesize

          1KB

          MD5

          21612f96dff4bfdab4bc6665dc339fba

          SHA1

          c1bebf06b0670585dba0680c42cd4e89c399247d

          SHA256

          0044f69b035e5547aba701b4e6d5549aa15a1babf87aa772579a529b7f5567fd

          SHA512

          2e4ecaef98e38ff6c6a31e79446f9e42fe429d453fd537c0f016d3a0ffa249886b9ec92567bcd62cd824a5a64bf0be749bc177f3b0ad2dc7755b57a4a0d7a039

        • memory/1956-25-0x0000000074D40000-0x000000007542E000-memory.dmp

          Filesize

          6.9MB

        • memory/1956-1-0x0000000074D40000-0x000000007542E000-memory.dmp

          Filesize

          6.9MB

        • memory/1956-2-0x0000000004DA0000-0x0000000004DE0000-memory.dmp

          Filesize

          256KB

        • memory/1956-3-0x0000000000700000-0x0000000000716000-memory.dmp

          Filesize

          88KB

        • memory/1956-4-0x0000000000710000-0x000000000071A000-memory.dmp

          Filesize

          40KB

        • memory/1956-5-0x0000000005D60000-0x0000000005DCA000-memory.dmp

          Filesize

          424KB

        • memory/1956-0-0x0000000000C50000-0x0000000000D0C000-memory.dmp

          Filesize

          752KB

        • memory/1976-31-0x0000000070870000-0x0000000070E1B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-32-0x0000000070870000-0x0000000070E1B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-36-0x0000000070870000-0x0000000070E1B000-memory.dmp

          Filesize

          5.7MB

        • memory/1976-35-0x0000000002430000-0x0000000002470000-memory.dmp

          Filesize

          256KB

        • memory/1976-34-0x0000000002430000-0x0000000002470000-memory.dmp

          Filesize

          256KB

        • memory/1976-33-0x0000000002430000-0x0000000002470000-memory.dmp

          Filesize

          256KB

        • memory/2720-23-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-13-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-27-0x0000000074D40000-0x000000007542E000-memory.dmp

          Filesize

          6.9MB

        • memory/2720-28-0x0000000004770000-0x00000000047B0000-memory.dmp

          Filesize

          256KB

        • memory/2720-11-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-26-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-15-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-21-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2720-17-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2720-38-0x0000000074D40000-0x000000007542E000-memory.dmp

          Filesize

          6.9MB

        • memory/2720-39-0x0000000004770000-0x00000000047B0000-memory.dmp

          Filesize

          256KB