Analysis

  • max time kernel
    124s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 03:13

General

  • Target

    59494a51618f234021c0dae2d87667ce9e431b8a75a1b4952d3e48bf71492fbb.exe

  • Size

    2.1MB

  • MD5

    8168481e7fcc45a8c01adc93985bf29c

  • SHA1

    28e8c9bd9b0274ab5767e47c263d46b174e780d7

  • SHA256

    59494a51618f234021c0dae2d87667ce9e431b8a75a1b4952d3e48bf71492fbb

  • SHA512

    b241186b7de203b5ed910b6e3abda1cdbf1fd5a19a2f7d743fbc9906d71a1a4a429bffd1f37ceb6b976aa1069f5865bacd1ed32540d0af04633cc585317bba3f

  • SSDEEP

    24576:tipf1GQCFmAQEjlvZpLcOq4aBgzGWTAB:SoFllVq4DzGWTAB

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59494a51618f234021c0dae2d87667ce9e431b8a75a1b4952d3e48bf71492fbb.exe
    "C:\Users\Admin\AppData\Local\Temp\59494a51618f234021c0dae2d87667ce9e431b8a75a1b4952d3e48bf71492fbb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"
      2⤵
        PID:5052
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
        2⤵
          PID:4032
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
          2⤵
            PID:4236
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"
            2⤵
              PID:4268
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
              2⤵
                PID:3112
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"
                2⤵
                  PID:4812
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
                  2⤵
                    PID:3200
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                    2⤵
                      PID:2940
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                      2⤵
                        PID:1252
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
                        2⤵
                          PID:3472
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
                          2⤵
                            PID:4600
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"
                            2⤵
                              PID:1544
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
                              2⤵
                                PID:3328
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                                2⤵
                                  PID:1384
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"
                                  2⤵
                                    PID:3068
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                                    2⤵
                                      PID:1416
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
                                      2⤵
                                        PID:4388
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
                                        2⤵
                                          PID:1668
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                          2⤵
                                            PID:3968
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                                            2⤵
                                            • Accesses Microsoft Outlook profiles
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • outlook_office_path
                                            • outlook_win_path
                                            PID:1616

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • memory/1160-6-0x00007FFAE0600000-0x00007FFAE10C1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1160-1-0x00007FFAE0600000-0x00007FFAE10C1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1160-2-0x000001BF83A20000-0x000001BF83A30000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1160-3-0x000001BF82150000-0x000001BF821BC000-memory.dmp

                                          Filesize

                                          432KB

                                        • memory/1160-0-0x000001BF81B90000-0x000001BF81DAC000-memory.dmp

                                          Filesize

                                          2.1MB

                                        • memory/1616-9-0x0000000005AF0000-0x0000000005B00000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1616-7-0x0000000074AC0000-0x0000000075270000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/1616-8-0x0000000005ED0000-0x0000000006474000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/1616-4-0x0000000000400000-0x000000000042E000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/1616-10-0x00000000059C0000-0x0000000005A5C000-memory.dmp

                                          Filesize

                                          624KB

                                        • memory/1616-11-0x0000000005990000-0x00000000059A8000-memory.dmp

                                          Filesize

                                          96KB

                                        • memory/1616-12-0x0000000005E00000-0x0000000005E66000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/1616-13-0x0000000006C20000-0x0000000006CB2000-memory.dmp

                                          Filesize

                                          584KB

                                        • memory/1616-14-0x0000000006E10000-0x0000000006E1A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1616-15-0x00000000070A0000-0x00000000070F0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1616-16-0x0000000074AC0000-0x0000000075270000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/1616-17-0x0000000005AF0000-0x0000000005B00000-memory.dmp

                                          Filesize

                                          64KB