Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2023 07:39

General

  • Target

    123 WHL (ASA route) SSHAS0123860.exe

  • Size

    691KB

  • MD5

    52092f980201ffce0352e5126ed0bf43

  • SHA1

    919d960cad9c7495d253f741fe56000bfe11e938

  • SHA256

    54aecbaf7821c0ee087cae191865a7df8b58408efbaec7b96b6b0dda54efd32f

  • SHA512

    ed8aa398d970628d7e5d759f0567d778eafac99807a70dde406bc0ecd1a1f57c5f13cbb7655053bb088fe81ea0b337becd9b598be49a71fbddd343b9249ed705

  • SSDEEP

    12288:fAcopox4QzSIGjRzgx1JtoZX8F8D0m3SqazJb+cgxWZqiwn4DbOKij:zeQSftg3Jto4eSqRcm/iw421

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123 WHL (ASA route) SSHAS0123860.exe
    "C:\Users\Admin\AppData\Local\Temp\123 WHL (ASA route) SSHAS0123860.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\123 WHL (ASA route) SSHAS0123860.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2876
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IWrcfjTZglaJYu.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IWrcfjTZglaJYu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA2C5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1428
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpA2C5.tmp

    Filesize

    1KB

    MD5

    a1464f6a2cba82aabc014b0765854f21

    SHA1

    e31afa29a58a6918599c950e341cb546cb55f75c

    SHA256

    a1955f442ecb0b03873374d0e80b222522963f82a383ed7d8af30840cd9ffe64

    SHA512

    e7bc2dbfa22cfd05b5eb22cfbda17d6f738ba76cc32da88ed3c6142bd184d06d88753f47818dcb1265d5a4a5117c049f557a9ffcb0f98f6beff1deac701bd64b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A72GBHSRUUHIBIPSCWAX.temp

    Filesize

    7KB

    MD5

    16d01f3edbdbef36bff9b0280d61d573

    SHA1

    2a22af885fba9cb9dc7d80b3a4e9d49c18d61908

    SHA256

    da1aae31310e3d5a6968d8cdec702590953cb80748b5f6ac2071a2c52531b952

    SHA512

    70e2de44df8d7bc338e2da3c529272370f83550cfe14256d94285301f23df54db9a56f4ccc56bba0571baf6109fb0cd6d594911e14b55698d541555de85b1139

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    16d01f3edbdbef36bff9b0280d61d573

    SHA1

    2a22af885fba9cb9dc7d80b3a4e9d49c18d61908

    SHA256

    da1aae31310e3d5a6968d8cdec702590953cb80748b5f6ac2071a2c52531b952

    SHA512

    70e2de44df8d7bc338e2da3c529272370f83550cfe14256d94285301f23df54db9a56f4ccc56bba0571baf6109fb0cd6d594911e14b55698d541555de85b1139

  • memory/2264-37-0x0000000002A10000-0x0000000002A50000-memory.dmp

    Filesize

    256KB

  • memory/2264-46-0x000000006E0D0000-0x000000006E67B000-memory.dmp

    Filesize

    5.7MB

  • memory/2264-35-0x000000006E0D0000-0x000000006E67B000-memory.dmp

    Filesize

    5.7MB

  • memory/2264-41-0x0000000002A10000-0x0000000002A50000-memory.dmp

    Filesize

    256KB

  • memory/2264-39-0x000000006E0D0000-0x000000006E67B000-memory.dmp

    Filesize

    5.7MB

  • memory/2480-44-0x00000000730F0000-0x00000000737DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2480-48-0x00000000048F0000-0x0000000004930000-memory.dmp

    Filesize

    256KB

  • memory/2480-19-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2480-21-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2480-23-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2480-25-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2480-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2480-29-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2480-49-0x00000000730F0000-0x00000000737DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2480-31-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2480-34-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2876-40-0x0000000001B80000-0x0000000001BC0000-memory.dmp

    Filesize

    256KB

  • memory/2876-42-0x0000000001B80000-0x0000000001BC0000-memory.dmp

    Filesize

    256KB

  • memory/2876-45-0x000000006E0D0000-0x000000006E67B000-memory.dmp

    Filesize

    5.7MB

  • memory/2876-38-0x000000006E0D0000-0x000000006E67B000-memory.dmp

    Filesize

    5.7MB

  • memory/2876-36-0x000000006E0D0000-0x000000006E67B000-memory.dmp

    Filesize

    5.7MB

  • memory/2876-43-0x0000000001B80000-0x0000000001BC0000-memory.dmp

    Filesize

    256KB

  • memory/3052-6-0x0000000000B10000-0x0000000000B8C000-memory.dmp

    Filesize

    496KB

  • memory/3052-5-0x00000000003B0000-0x00000000003BA000-memory.dmp

    Filesize

    40KB

  • memory/3052-0-0x0000000000EC0000-0x0000000000F72000-memory.dmp

    Filesize

    712KB

  • memory/3052-4-0x0000000000390000-0x0000000000396000-memory.dmp

    Filesize

    24KB

  • memory/3052-3-0x00000000003D0000-0x00000000003E8000-memory.dmp

    Filesize

    96KB

  • memory/3052-33-0x0000000074590000-0x0000000074C7E000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-2-0x0000000004810000-0x0000000004850000-memory.dmp

    Filesize

    256KB

  • memory/3052-1-0x0000000074590000-0x0000000074C7E000-memory.dmp

    Filesize

    6.9MB