Analysis

  • max time kernel
    125s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2023 16:43

General

  • Target

    d4023d971af3eda8dddfc41493d49f3cc47748ad20cdcf602bf19f88c39e06f4.exe

  • Size

    509KB

  • MD5

    2c013b3be5e26e53cace27abe1d9803b

  • SHA1

    f5c217e1a7bf046e0e1c0efed58345725795e57d

  • SHA256

    d4023d971af3eda8dddfc41493d49f3cc47748ad20cdcf602bf19f88c39e06f4

  • SHA512

    c2c5349e383f03827c90f7590f9e3f97a566a294b705bb39ab8c64d34c8780b01a791307f250c63252026fe68586f1409915959308b4c92bfb20484b0452784e

  • SSDEEP

    12288:wrs6p8UdGrUOUitLuWbmjV7AVUZGclZI8w0bfDudz:SsedGr/Ui1uTjVqUQclLbSl

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4023d971af3eda8dddfc41493d49f3cc47748ad20cdcf602bf19f88c39e06f4.exe
    "C:\Users\Admin\AppData\Local\Temp\d4023d971af3eda8dddfc41493d49f3cc47748ad20cdcf602bf19f88c39e06f4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe
      "C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe
        "C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gqtakxahmzc.i

    Filesize

    333KB

    MD5

    e44be8ba29bd4b39159bca2feadae8af

    SHA1

    1c1d829c0be8b41ec19a068b07551a9f7961d3f7

    SHA256

    939e4417955a6b7a0aec691d28e907b2e05e08632de176d34cd6a8ca30e299c9

    SHA512

    569a0f8fab91a673ffabc425061d38365fcca515671d6c8a6a1307b2e170da38bebc258651671d97b2b6d83e7a57868de8810caac77f79b2f61af036b886901c

  • C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe

    Filesize

    287KB

    MD5

    337dcbd6bf024a6ab5ac8983e4b839f6

    SHA1

    0582e3ed802ee37d8c76517317025bf2d393d204

    SHA256

    c34a0bf8e49cd79a4635cc11dd43de1e5317393cb066146365c51e29e1cd04b3

    SHA512

    13bb30789d8e70f4e1c0260510d76bdddb2ab2f98ca1816f2a3f6988edcda4586657937c4470c33385419189d193e3d47a5705d7df836f1b4964046d12dcb70f

  • C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe

    Filesize

    287KB

    MD5

    337dcbd6bf024a6ab5ac8983e4b839f6

    SHA1

    0582e3ed802ee37d8c76517317025bf2d393d204

    SHA256

    c34a0bf8e49cd79a4635cc11dd43de1e5317393cb066146365c51e29e1cd04b3

    SHA512

    13bb30789d8e70f4e1c0260510d76bdddb2ab2f98ca1816f2a3f6988edcda4586657937c4470c33385419189d193e3d47a5705d7df836f1b4964046d12dcb70f

  • C:\Users\Admin\AppData\Local\Temp\omkjnbxkb.exe

    Filesize

    287KB

    MD5

    337dcbd6bf024a6ab5ac8983e4b839f6

    SHA1

    0582e3ed802ee37d8c76517317025bf2d393d204

    SHA256

    c34a0bf8e49cd79a4635cc11dd43de1e5317393cb066146365c51e29e1cd04b3

    SHA512

    13bb30789d8e70f4e1c0260510d76bdddb2ab2f98ca1816f2a3f6988edcda4586657937c4470c33385419189d193e3d47a5705d7df836f1b4964046d12dcb70f

  • memory/1532-16-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1532-17-0x0000000005740000-0x0000000005CE4000-memory.dmp

    Filesize

    5.6MB

  • memory/1532-10-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1532-11-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1532-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1532-13-0x0000000002A40000-0x0000000002A82000-memory.dmp

    Filesize

    264KB

  • memory/1532-26-0x0000000006920000-0x000000000692A000-memory.dmp

    Filesize

    40KB

  • memory/1532-15-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1532-14-0x0000000073E80000-0x0000000074630000-memory.dmp

    Filesize

    7.7MB

  • memory/1532-8-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1532-18-0x0000000005110000-0x0000000005176000-memory.dmp

    Filesize

    408KB

  • memory/1532-19-0x0000000073E80000-0x0000000074630000-memory.dmp

    Filesize

    7.7MB

  • memory/1532-20-0x0000000006770000-0x00000000067C0000-memory.dmp

    Filesize

    320KB

  • memory/1532-21-0x0000000006860000-0x00000000068FC000-memory.dmp

    Filesize

    624KB

  • memory/1532-22-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1532-23-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1532-24-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1532-25-0x00000000069A0000-0x0000000006A32000-memory.dmp

    Filesize

    584KB

  • memory/3496-6-0x0000000000A10000-0x0000000000B10000-memory.dmp

    Filesize

    1024KB