Analysis

  • max time kernel
    164s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2023 09:25

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.29337.exe

  • Size

    930KB

  • MD5

    0e89230203fa44d82492293a51980a46

  • SHA1

    34bc8651234d58168124589acf94a97caf4061d8

  • SHA256

    ca72d4bf88b667018f42bd8079f47678e3dfb0135a94dca3dcab84500490e5d7

  • SHA512

    348c103de42172b4812a79687f0d43122531ce235f88f7cdd582c7460007e928d4718bb8030c9a51536424c6c751cf21cede8e5ec48189cc35d5391b9d9252f0

  • SSDEEP

    12288:SekI8fHfrhdI6u0eCkrNK2XWtEAKzinIlDQzd4tOHWcxl6P7r9r/+ppppppppppR:r+fHfrhddgCko2GtfIUd4U2Il61q

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.29337.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.29337.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.29337.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bKIJgvDOlDhvx.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2320
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bKIJgvDOlDhvx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1323.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2104
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp1323.tmp

      Filesize

      1KB

      MD5

      7da7dc23f66be45ddf595aa04643529e

      SHA1

      0ce7c86f501d885f02961afb1a9a5660e4d00e1e

      SHA256

      e7dae70e02ec2d0d0bd6bfd294328b6042e424c4acb61aafb1a39d85b60be23d

      SHA512

      6c989665f83a5a3626ec1f4ea5018aa1c3373d79e8f7c93d38149f21d4ad50bb10b43c140056786c07db26f6c8aa3a94079f69a2391a50894b7f2113a7544bbc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RWZ99RCOKE4ACIY7ZV1S.temp

      Filesize

      7KB

      MD5

      49a5284f058788710d54a3f462cabe12

      SHA1

      9c4327026182b423209e189513ffbf5961b06a0f

      SHA256

      4295e68e67fbac5a731336332c88c04ee1611d24ed21747d60e95d1fa0bd902e

      SHA512

      ae216bdd7dda1afa51cb225a292916fe1a02cd7f3ed0992ae84bc9059a260fbb9a127a6f1464bb0b8ed14c08411acf5ba079e971550cf84a98fddf24c2958d15

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      49a5284f058788710d54a3f462cabe12

      SHA1

      9c4327026182b423209e189513ffbf5961b06a0f

      SHA256

      4295e68e67fbac5a731336332c88c04ee1611d24ed21747d60e95d1fa0bd902e

      SHA512

      ae216bdd7dda1afa51cb225a292916fe1a02cd7f3ed0992ae84bc9059a260fbb9a127a6f1464bb0b8ed14c08411acf5ba079e971550cf84a98fddf24c2958d15

    • memory/2320-27-0x00000000004A0000-0x00000000004E0000-memory.dmp

      Filesize

      256KB

    • memory/2320-22-0x000000006DB80000-0x000000006E12B000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-35-0x000000006DB80000-0x000000006E12B000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-32-0x000000006DB80000-0x000000006E12B000-memory.dmp

      Filesize

      5.7MB

    • memory/2440-8-0x0000000005CA0000-0x0000000005D1C000-memory.dmp

      Filesize

      496KB

    • memory/2440-3-0x0000000000490000-0x00000000004A6000-memory.dmp

      Filesize

      88KB

    • memory/2440-2-0x0000000004E70000-0x0000000004EB0000-memory.dmp

      Filesize

      256KB

    • memory/2440-1-0x0000000074060000-0x000000007474E000-memory.dmp

      Filesize

      6.9MB

    • memory/2440-7-0x00000000004C0000-0x00000000004CA000-memory.dmp

      Filesize

      40KB

    • memory/2440-4-0x0000000074060000-0x000000007474E000-memory.dmp

      Filesize

      6.9MB

    • memory/2440-0-0x0000000000D10000-0x0000000000DFE000-memory.dmp

      Filesize

      952KB

    • memory/2440-5-0x0000000004E70000-0x0000000004EB0000-memory.dmp

      Filesize

      256KB

    • memory/2440-6-0x00000000004B0000-0x00000000004B8000-memory.dmp

      Filesize

      32KB

    • memory/2488-24-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2488-21-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2488-28-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2488-31-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2620-25-0x000000006DB80000-0x000000006E12B000-memory.dmp

      Filesize

      5.7MB

    • memory/2620-34-0x000000006DB80000-0x000000006E12B000-memory.dmp

      Filesize

      5.7MB

    • memory/2620-29-0x000000006DB80000-0x000000006E12B000-memory.dmp

      Filesize

      5.7MB