Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2023 18:55

General

  • Target

    payment confirmation.exe

  • Size

    787KB

  • MD5

    bc093d7923b582bc37b09a814940a4e4

  • SHA1

    4ff679166f942395b2d335757f759f39fe8dcdd4

  • SHA256

    d9961b923d5187cab6c6216a4de0f61a03a24fd3cf6765a5c3eb0963e05f580c

  • SHA512

    4f1eb3dd9df2bb7f80a47d39083522c3255102bed9c29fefda6513f4a0224287138c64911360acec8140f76f8b2d483d14f28a30ea12d66661015d3592401af7

  • SSDEEP

    12288:QWodJz/ZGPpglaJwnQieFtD6Ba+FdEmp2UdAmhu1qCvRUULCeNPSiyyjK:QzEpglw53t2I02wfU1PnNPd8

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\payment confirmation.exe
    "C:\Users\Admin\AppData\Local\Temp\payment confirmation.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2872
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    467d33abc54f66334438842ac4ef4d1f

    SHA1

    1905268aeddc7d5fb0757275c6acee79bfca7571

    SHA256

    1fc6405eb7b5ca426375f18191876be095894f87a5cfdd56fa983b26010e8aa2

    SHA512

    159a4d207350bd679c7f53debebbea8b41c58c2e3c9b693bea145cd87770f7d8cd9f36de6cdabcfc37158ba6011c1113b6270efc73463bb6baabf72373c076d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa0874d1757aad0f952902096c014668

    SHA1

    7fae5384fd59ce324365f1215d9fb7760c144a4c

    SHA256

    a953a3a0e51b28dbd68c43c70f19ab105be738876fd52f473d6416df2ddd5aa5

    SHA512

    ec3ef59d453a4c37405d62df974d405ec3b2d36a50fb039fd2e75509a890800b9faa98a9edc8b63943220558563aaced7f99744fce147318ee86c5010f905de4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4286b211e2ccd8a71ba05c06e52346f2

    SHA1

    32f36df1ca8f401b86bc6772be772a0a5ab23bfc

    SHA256

    5d462e8ff1a70bcaac8a2d1e86278bad3ffbad105dd74c61452eff565406344f

    SHA512

    3a978075349129bd3303a9b6387f07309b68c1b88e557e24890ef516f2422f956723d2f4475c31b492930273859eb55f9dca0c1b3518eb57e0096e5b0658ede6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13ea35352572d108240de0786f8f7812

    SHA1

    dbd31049770a3399d8e72360a265fee3e56e50a4

    SHA256

    155c4c3b11b9e0582545553a7fe7c87689d7271b31836919e722ff99d315d5bd

    SHA512

    3567d10a80f270157abc2a6526cff83d05b51f24935bf845e88357d8f1343cfd6737ac9f086ab4f69f3e1a83af6e077a09d9a10ed0e873b3661a9a51e5c3187b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bef5ced5e664afb700828bae256333a8

    SHA1

    86f31e4a75ec35da90077fb25c12e66c3bd54fe9

    SHA256

    646734f986759aa99bc650095e52106d08a63a976cf1517043bfa2742f02ee43

    SHA512

    c035c034f44c30f42b53b35cd6e27c59bf4d28ca1153805b5892155386012758f8f388bf438015f05d892f56dd381ec41f4326ef886ab2b154dab9b739ec3774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5cd1ffccba241da291ae15f25e15715

    SHA1

    2f1f1dc518d136ebee267789749ac40a4c7f33be

    SHA256

    73263b01e0ca17fdcfd96611492743165038051937124bbef826e55e739380a0

    SHA512

    f9d609631dbbe1cd27bad0ff70e153e49542a8ed99bf5e5392f493220d6c6ab70b2d3c64fa5a67dde3277b955d25632b60bc552e796ed7543ba7b8d51426cfdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d4c0be3c448983ef0e2d0d24b332758

    SHA1

    7b41fb3b8f15f7af80018fca87e79aa1def64bf5

    SHA256

    3a8d92b5877aba845d5f2a79272ca05a06bf9cb185a00f21e73eb71d26f0c572

    SHA512

    beec1dae28bb45ad664104ec617bc8c437d21d7349a26ad5c02ad2aa034f847da2785387388c6cf35da8d4024c46655567fe84478f5e3e43c1fcfa6d8ddedbfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    575cdbea2de66184d31f74292b494452

    SHA1

    64067ab3b899769e89bf350aa3f6f607b98c7612

    SHA256

    02c8dde43dac50c59e7557c923736b640231d3efff9add3402d915d00f8289af

    SHA512

    b8cb5e899996a7997b97685d77092fffbf70570bf79a218cb1671751e7b4aaf0915783e42d222e657f1797e1ded547be4b941dc741c2e0c8b71ffa109d9f4ba5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    479754c6acc4b5b405b631d8e065d1b0

    SHA1

    bef4138ddfcffef94433397f415f9fd18a2b4673

    SHA256

    d56d9dcada5a74aa9ea3e54ce3d75ca746d1530d756625dbb0ef1db8b08d663c

    SHA512

    455dcc8cbaa387e527ab51beca72d479b979471c2640b0d08b865b9af2d1f1d304eae677b3b5da627af89f372af33d3f9b24af7110ab948947f514b5b2927cc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eeba04fa990c91580c902281cb44d35a

    SHA1

    fd87eea26686e3433ada56af8ce16bf5cc3c4b46

    SHA256

    93292e74173c3e4017f7b29833bfbec851a921ac86e358116667e1fd7db04cb6

    SHA512

    4d9ff2af048d9d91b728ed2f830ffb0d55dc3a7e2eb8a48aa2aebaf457383cd6e248b4c8088800ceb883d117bd373c74fe68905668c00b8770011e713b16b7cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21b9ad9e4e9de1b2a612e1fcdd9364af

    SHA1

    a134d0238d88137cec2dd9c0eda8e0fa30e37e31

    SHA256

    21889ef6bfe6c249de23a55d98ce1ff2bd26e0d0c4846beff18569a9e0a6e681

    SHA512

    3d5cb1f6098d1ee9c8b593432cdea3326cffddcd6e4ea2e32ac308c378ade46b3401f6c8738bec9485673a2387da2c7807fb4b6f39ba7771ab35a95ad1ed7d61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5071fda173a3c8ff6621be09b554f61

    SHA1

    e01afcd3621632cfcd8cc4f7b96135d3c3d31d6c

    SHA256

    4afa5085a7e38084db301f7eec60028322e5ec46887600e0177f89fce65c133a

    SHA512

    233bcd682d3a6ade8aaa4312226b7b692c109bbb45638f2ad27136a3dfc5e12711b1c33c2e614f89b7f2d9bebede9678e675dfcc598f84a8ce1f03724612aff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    9505b1d1d317e720e6adda354f7db214

    SHA1

    5d38e7e4956edbac1d9e8091c36b4459f77c0704

    SHA256

    ee7d078869baf9a05d336be04f42f77943f445b31ce924fde1b84225ece9063f

    SHA512

    3d4f35fe0d9116d269a24c0f0b8cf5a62d3f3f906819c98fa790a446369b22cc4aa73d2a53abc01e45967c9dab8c240199fbd04e13ee69cb80adf84d2e0c75b5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\pagsbca\imagestore.dat

    Filesize

    5KB

    MD5

    5a7de38f185546fd9022e206ad52cd7c

    SHA1

    9d34e12c25210565f95b9129b4d2c3515cd93183

    SHA256

    3b0053600e77c284a9cc7348d25cfece070b06d843eabd48ead2841c8b58c1f6

    SHA512

    65a27d1b336dc77753ef246f1b71be293baf86029059e84076ad1d646153c865a06155efde110b3421c2b1eb1ac98173445e9991e826df6b7564e73f3bb26a2e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9G8QJ0N4\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\CabE515.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\CabE5A5.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE516.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\TarE5B8.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2096-33-0x000000006F540000-0x000000006FAEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-28-0x000000006F540000-0x000000006FAEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2096-32-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2096-31-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2096-30-0x0000000002700000-0x0000000002740000-memory.dmp

    Filesize

    256KB

  • memory/2096-29-0x000000006F540000-0x000000006FAEB000-memory.dmp

    Filesize

    5.7MB

  • memory/2144-7-0x0000000074340000-0x0000000074A2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2144-0-0x0000000000330000-0x00000000003FA000-memory.dmp

    Filesize

    808KB

  • memory/2144-24-0x0000000074340000-0x0000000074A2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2144-1-0x0000000074340000-0x0000000074A2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2144-2-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2144-3-0x0000000004A00000-0x0000000004A40000-memory.dmp

    Filesize

    256KB

  • memory/2144-4-0x00000000004E0000-0x0000000000520000-memory.dmp

    Filesize

    256KB

  • memory/2144-5-0x0000000000A80000-0x0000000000AC0000-memory.dmp

    Filesize

    256KB

  • memory/2144-6-0x0000000001FF0000-0x000000000203C000-memory.dmp

    Filesize

    304KB

  • memory/2656-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2656-12-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-16-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-18-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-22-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-27-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-25-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB