Analysis

  • max time kernel
    98s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 02:27

General

  • Target

    71b3391b6e2ec091dc7d56960d3b8f543b6011b5c3d68fe7e86f33a02605e21d.exe

  • Size

    350KB

  • MD5

    f8072b8740d7ec0f694d3628e78d5a5a

  • SHA1

    a6620334c67dddcc6dfef55f202a4848416b4f5c

  • SHA256

    71b3391b6e2ec091dc7d56960d3b8f543b6011b5c3d68fe7e86f33a02605e21d

  • SHA512

    7bf3d20ae87139fef75524211e21cd6a28b1f6f0dc3d10dd36fe2bf90574f3ccbbc3b4bb1d05b7bf7997a16ecede9506be4111fe98a513f3c4d5efda2ae8b47d

  • SSDEEP

    6144:2BlL/DWicNIlgOw0nueLkxVtEM9AjhtADy6aia4Htw0vdlRSvdWpC6nmd6:UBWNIlgOw4uZTtPGhtKyz4Nw01lo+fmI

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71b3391b6e2ec091dc7d56960d3b8f543b6011b5c3d68fe7e86f33a02605e21d.exe
    "C:\Users\Admin\AppData\Local\Temp\71b3391b6e2ec091dc7d56960d3b8f543b6011b5c3d68fe7e86f33a02605e21d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe
      "C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe
        "C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe"
        3⤵
        • Executes dropped EXE
        PID:1944
      • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe
        "C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cnovm.pji

    Filesize

    333KB

    MD5

    bd9a4b98da605f85eab05cf49cb91b05

    SHA1

    af956d58f683e8c9c3ece1c4bffe3a980d627151

    SHA256

    2ae7ffc957ce2115eb58a5a0a3dee7aea2e76f4d770a705f348a04ca844b173f

    SHA512

    da2bfb043a1205f91da80abbedfd1700e736000c4a08deb3386bb92018f72c90aab51d9950a6ffa1cac571df12d743019fc383489f44554e08a878f9d02d8fe9

  • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe

    Filesize

    178KB

    MD5

    fa0fbedc16c6871bf81f17269e61eb10

    SHA1

    f69519160e26e01b32b7dc12e785360e0cb56e5a

    SHA256

    0aa0abf2dcacbf6d05529e1987cd340775f04c63571eb0d41843eec4bf32cf9f

    SHA512

    135d544c577f8a0e84946151eb75ac39a10177ec26d7fbd8bdfd7249aaa44a33603f4f00018aea8e69e96b6cb9d542eb96b55fa701593483a2bbc7c387e99e1d

  • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe

    Filesize

    178KB

    MD5

    fa0fbedc16c6871bf81f17269e61eb10

    SHA1

    f69519160e26e01b32b7dc12e785360e0cb56e5a

    SHA256

    0aa0abf2dcacbf6d05529e1987cd340775f04c63571eb0d41843eec4bf32cf9f

    SHA512

    135d544c577f8a0e84946151eb75ac39a10177ec26d7fbd8bdfd7249aaa44a33603f4f00018aea8e69e96b6cb9d542eb96b55fa701593483a2bbc7c387e99e1d

  • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe

    Filesize

    178KB

    MD5

    fa0fbedc16c6871bf81f17269e61eb10

    SHA1

    f69519160e26e01b32b7dc12e785360e0cb56e5a

    SHA256

    0aa0abf2dcacbf6d05529e1987cd340775f04c63571eb0d41843eec4bf32cf9f

    SHA512

    135d544c577f8a0e84946151eb75ac39a10177ec26d7fbd8bdfd7249aaa44a33603f4f00018aea8e69e96b6cb9d542eb96b55fa701593483a2bbc7c387e99e1d

  • C:\Users\Admin\AppData\Local\Temp\ldzbtntv.exe

    Filesize

    178KB

    MD5

    fa0fbedc16c6871bf81f17269e61eb10

    SHA1

    f69519160e26e01b32b7dc12e785360e0cb56e5a

    SHA256

    0aa0abf2dcacbf6d05529e1987cd340775f04c63571eb0d41843eec4bf32cf9f

    SHA512

    135d544c577f8a0e84946151eb75ac39a10177ec26d7fbd8bdfd7249aaa44a33603f4f00018aea8e69e96b6cb9d542eb96b55fa701593483a2bbc7c387e99e1d

  • memory/316-5-0x0000000000700000-0x0000000000702000-memory.dmp

    Filesize

    8KB

  • memory/3884-15-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/3884-19-0x0000000005230000-0x0000000005296000-memory.dmp

    Filesize

    408KB

  • memory/3884-10-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3884-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3884-13-0x0000000004F80000-0x0000000004FC2000-memory.dmp

    Filesize

    264KB

  • memory/3884-14-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/3884-8-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3884-16-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/3884-17-0x00000000055E0000-0x0000000005B84000-memory.dmp

    Filesize

    5.6MB

  • memory/3884-11-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/3884-18-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/3884-20-0x0000000005D90000-0x0000000005DE0000-memory.dmp

    Filesize

    320KB

  • memory/3884-21-0x0000000005E80000-0x0000000005F1C000-memory.dmp

    Filesize

    624KB

  • memory/3884-22-0x00000000744D0000-0x0000000074C80000-memory.dmp

    Filesize

    7.7MB

  • memory/3884-23-0x0000000006100000-0x0000000006192000-memory.dmp

    Filesize

    584KB

  • memory/3884-24-0x0000000006080000-0x000000000608A000-memory.dmp

    Filesize

    40KB

  • memory/3884-25-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/3884-26-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/3884-27-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB