Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2023 10:06

General

  • Target

    9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe

  • Size

    684KB

  • MD5

    bfdbe187b8290a14f28ddb2eb9b38c23

  • SHA1

    5362c2ab83a79d002675f251f78971efc8b17a90

  • SHA256

    9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53

  • SHA512

    c10e8dbb7b2f26ba5ce843cb3ab6ed1d1c83be1786fadc16a25b91358f78e0c53f8411116187fe6fdd13fbe52165cce73604c4e98f59e71b4aa531a6071072e2

  • SSDEEP

    12288:5E6jD/dzYPbyM+kdGORb3HEuCOcpS27ybVX1XMEbKA0ENz:5tD/EmPjiXZgS27ybPUEN

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe
    "C:\Users\Admin\AppData\Local\Temp\9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9d176c33ea44de565823c1ae56a0f77556db319dca4453b677ed11adbcbade53.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2656
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OBJqprlSHr.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2580
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OBJqprlSHr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC0DF.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2604
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpC0DF.tmp

      Filesize

      1KB

      MD5

      569e199b65459fe86487d307efa3def9

      SHA1

      599f0e208f72ea97388aefac4efcfab95c1fe12a

      SHA256

      8ac736662e23cd78f379b14883b8cb9f7485f4e41a84d2079826b73414910e6e

      SHA512

      d740b27dc862b57b12cb08d66a2fbb487858c1b772f53ab3934987329fb225668379c61be6ee23213fbaafe03868f4db5db419a27915e422e766843f6fb68a86

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R9893KVVVP4OI1Y4ELA3.temp

      Filesize

      7KB

      MD5

      09af4e397e4154cfc15f0e59f21e7254

      SHA1

      0a1da5ebd4882dd9905858ec25ba5a13385e67d0

      SHA256

      fe68c7aeb9e892cf104a190ec4520e40a4b1bd61bc5184b28e01e53ffea91de6

      SHA512

      d86e847c152f91047c510b57e9b39a58e70ae1652388441497d04c72374f7bacd7e6126bc90e452ab969a6fc061ccec6684c59b6ba5650da3db49b24ccf02722

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      09af4e397e4154cfc15f0e59f21e7254

      SHA1

      0a1da5ebd4882dd9905858ec25ba5a13385e67d0

      SHA256

      fe68c7aeb9e892cf104a190ec4520e40a4b1bd61bc5184b28e01e53ffea91de6

      SHA512

      d86e847c152f91047c510b57e9b39a58e70ae1652388441497d04c72374f7bacd7e6126bc90e452ab969a6fc061ccec6684c59b6ba5650da3db49b24ccf02722

    • memory/1164-31-0x0000000074E70000-0x000000007555E000-memory.dmp

      Filesize

      6.9MB

    • memory/1164-1-0x0000000074E70000-0x000000007555E000-memory.dmp

      Filesize

      6.9MB

    • memory/1164-5-0x00000000005E0000-0x00000000005EA000-memory.dmp

      Filesize

      40KB

    • memory/1164-6-0x0000000005260000-0x00000000052DC000-memory.dmp

      Filesize

      496KB

    • memory/1164-7-0x0000000074E70000-0x000000007555E000-memory.dmp

      Filesize

      6.9MB

    • memory/1164-8-0x0000000000EE0000-0x0000000000F20000-memory.dmp

      Filesize

      256KB

    • memory/1164-3-0x0000000000630000-0x0000000000648000-memory.dmp

      Filesize

      96KB

    • memory/1164-2-0x0000000000EE0000-0x0000000000F20000-memory.dmp

      Filesize

      256KB

    • memory/1164-0-0x00000000011B0000-0x0000000001260000-memory.dmp

      Filesize

      704KB

    • memory/1164-4-0x00000000004C0000-0x00000000004C6000-memory.dmp

      Filesize

      24KB

    • memory/2436-33-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2436-21-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2436-24-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2436-43-0x0000000074E70000-0x000000007555E000-memory.dmp

      Filesize

      6.9MB

    • memory/2436-25-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2436-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2436-38-0x0000000074E70000-0x000000007555E000-memory.dmp

      Filesize

      6.9MB

    • memory/2436-29-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2436-23-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2436-39-0x0000000004C30000-0x0000000004C70000-memory.dmp

      Filesize

      256KB

    • memory/2436-35-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2580-36-0x0000000002670000-0x00000000026B0000-memory.dmp

      Filesize

      256KB

    • memory/2580-22-0x000000006EF00000-0x000000006F4AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2580-30-0x000000006EF00000-0x000000006F4AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2580-41-0x000000006EF00000-0x000000006F4AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-37-0x00000000026B0000-0x00000000026F0000-memory.dmp

      Filesize

      256KB

    • memory/2656-40-0x000000006EF00000-0x000000006F4AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-26-0x000000006EF00000-0x000000006F4AB000-memory.dmp

      Filesize

      5.7MB