Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2023 07:39

General

  • Target

    123 WHL (ASA route) SSHAS0123860.exe

  • Size

    691KB

  • MD5

    52092f980201ffce0352e5126ed0bf43

  • SHA1

    919d960cad9c7495d253f741fe56000bfe11e938

  • SHA256

    54aecbaf7821c0ee087cae191865a7df8b58408efbaec7b96b6b0dda54efd32f

  • SHA512

    ed8aa398d970628d7e5d759f0567d778eafac99807a70dde406bc0ecd1a1f57c5f13cbb7655053bb088fe81ea0b337becd9b598be49a71fbddd343b9249ed705

  • SSDEEP

    12288:fAcopox4QzSIGjRzgx1JtoZX8F8D0m3SqazJb+cgxWZqiwn4DbOKij:zeQSftg3Jto4eSqRcm/iw421

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123 WHL (ASA route) SSHAS0123860.exe
    "C:\Users\Admin\AppData\Local\Temp\123 WHL (ASA route) SSHAS0123860.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\123 WHL (ASA route) SSHAS0123860.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2408
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IWrcfjTZglaJYu.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1416
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IWrcfjTZglaJYu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCC49.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4280
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:3188
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:5004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      3d086a433708053f9bf9523e1d87a4e8

      SHA1

      b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

      SHA256

      6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

      SHA512

      931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      56a1bf2a7869ffe1a5ef5061edd9fd05

      SHA1

      bfd2afeb7c33fd849990e26f4fd0f3cfc1a8fb09

      SHA256

      ef4b383ab0482ad2bfa067ba5d465734a12217a0a6c06556e38f065d2178fa67

      SHA512

      70519556af02ae0422baca6fc5a0d7ab2f5cbce9216eabc8852287c79a2f6b1674c531a3a9eb7582480522f734c2630169f1a02f887545e62d9264188aec1e8c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b31405na.f2h.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmpCC49.tmp

      Filesize

      1KB

      MD5

      407cd3931127d8d198279da713132dc6

      SHA1

      cdedf4a45f355ecd2de31aa86bec4b7bb0795f47

      SHA256

      e8758952248083ed00b7cb2f8949e36f2fa3d807450249bd60892ef86e13e25d

      SHA512

      42374e6694abb77c70c5ba6d67c28d96b95a5c29f21532c619365d93ac3e9024eeb932cad4223ab0d2506a9559e012cd93b0dce6953e785d6fd9c7b82f375708

    • memory/1416-69-0x0000000006EC0000-0x0000000006EDE000-memory.dmp

      Filesize

      120KB

    • memory/1416-54-0x00000000030F0000-0x0000000003100000-memory.dmp

      Filesize

      64KB

    • memory/1416-81-0x0000000007C00000-0x0000000007C1A000-memory.dmp

      Filesize

      104KB

    • memory/1416-79-0x0000000007AE0000-0x0000000007B83000-memory.dmp

      Filesize

      652KB

    • memory/1416-86-0x0000000007E40000-0x0000000007E4E000-memory.dmp

      Filesize

      56KB

    • memory/1416-58-0x000000007FBA0000-0x000000007FBB0000-memory.dmp

      Filesize

      64KB

    • memory/1416-57-0x00000000713D0000-0x000000007141C000-memory.dmp

      Filesize

      304KB

    • memory/1416-82-0x0000000007C80000-0x0000000007C8A000-memory.dmp

      Filesize

      40KB

    • memory/1416-26-0x00000000061E0000-0x0000000006246000-memory.dmp

      Filesize

      408KB

    • memory/1416-46-0x0000000006330000-0x0000000006684000-memory.dmp

      Filesize

      3.3MB

    • memory/1416-97-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1416-21-0x00000000030F0000-0x0000000003100000-memory.dmp

      Filesize

      64KB

    • memory/1416-24-0x0000000006140000-0x0000000006162000-memory.dmp

      Filesize

      136KB

    • memory/1416-20-0x00000000030F0000-0x0000000003100000-memory.dmp

      Filesize

      64KB

    • memory/1416-25-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2408-18-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2408-88-0x0000000007D70000-0x0000000007D8A000-memory.dmp

      Filesize

      104KB

    • memory/2408-19-0x0000000002E20000-0x0000000002E30000-memory.dmp

      Filesize

      64KB

    • memory/2408-17-0x00000000058A0000-0x0000000005EC8000-memory.dmp

      Filesize

      6.2MB

    • memory/2408-37-0x0000000006100000-0x0000000006166000-memory.dmp

      Filesize

      408KB

    • memory/2408-96-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2408-90-0x0000000007D50000-0x0000000007D58000-memory.dmp

      Filesize

      32KB

    • memory/2408-87-0x0000000007C80000-0x0000000007C94000-memory.dmp

      Filesize

      80KB

    • memory/2408-85-0x0000000007C30000-0x0000000007C41000-memory.dmp

      Filesize

      68KB

    • memory/2408-84-0x0000000007CB0000-0x0000000007D46000-memory.dmp

      Filesize

      600KB

    • memory/2408-80-0x0000000008070000-0x00000000086EA000-memory.dmp

      Filesize

      6.5MB

    • memory/2408-52-0x0000000006720000-0x000000000673E000-memory.dmp

      Filesize

      120KB

    • memory/2408-53-0x0000000006B00000-0x0000000006B4C000-memory.dmp

      Filesize

      304KB

    • memory/2408-15-0x0000000002E30000-0x0000000002E66000-memory.dmp

      Filesize

      216KB

    • memory/2408-55-0x000000007FB70000-0x000000007FB80000-memory.dmp

      Filesize

      64KB

    • memory/2408-68-0x00000000713D0000-0x000000007141C000-memory.dmp

      Filesize

      304KB

    • memory/2408-56-0x0000000006D00000-0x0000000006D32000-memory.dmp

      Filesize

      200KB

    • memory/2604-16-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2604-0-0x00000000002D0000-0x0000000000382000-memory.dmp

      Filesize

      712KB

    • memory/2604-10-0x00000000099E0000-0x0000000009A7C000-memory.dmp

      Filesize

      624KB

    • memory/2604-7-0x00000000052D0000-0x00000000052D6000-memory.dmp

      Filesize

      24KB

    • memory/2604-50-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2604-6-0x0000000005160000-0x0000000005178000-memory.dmp

      Filesize

      96KB

    • memory/2604-5-0x0000000004D90000-0x0000000004D9A000-memory.dmp

      Filesize

      40KB

    • memory/2604-9-0x0000000006250000-0x00000000062CC000-memory.dmp

      Filesize

      496KB

    • memory/2604-4-0x0000000005010000-0x0000000005020000-memory.dmp

      Filesize

      64KB

    • memory/2604-8-0x00000000047A0000-0x00000000047AA000-memory.dmp

      Filesize

      40KB

    • memory/2604-2-0x0000000005300000-0x00000000058A4000-memory.dmp

      Filesize

      5.6MB

    • memory/2604-22-0x0000000005010000-0x0000000005020000-memory.dmp

      Filesize

      64KB

    • memory/2604-3-0x0000000004DF0000-0x0000000004E82000-memory.dmp

      Filesize

      584KB

    • memory/2604-1-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-89-0x0000000006230000-0x0000000006280000-memory.dmp

      Filesize

      320KB

    • memory/5004-49-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-47-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/5004-99-0x00000000050B0000-0x00000000050C0000-memory.dmp

      Filesize

      64KB

    • memory/5004-98-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/5004-51-0x00000000050B0000-0x00000000050C0000-memory.dmp

      Filesize

      64KB