Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2023 17:27

General

  • Target

    ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe

  • Size

    631KB

  • MD5

    ed4b8e965a5e8a2b185f38a2dc7b5c1b

  • SHA1

    4f9a24c87e5cea08769b8ba5559c755f9a8749e6

  • SHA256

    ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86

  • SHA512

    60c0518c3c6436889bee9dcf1cb11db8cbfbc2ca37aea8a245c1ba18537e079ed92a99a746d6a370d315daf6d7204ea7985a86da6bc827421cdc54fdf1ffe055

  • SSDEEP

    12288:j45+po2oQpPwiViAQZb9EuQlbmtDaB6x/rQj0fBcuCA1YDL4o:i+pJhpPwT1ZZEuQlatDaIx/rQscuDWN

Malware Config

Extracted

Family

agenttesla

C2

https://discord.com/api/webhooks/1179358691389087754/yHthw4-13k_nboZGWySep8nLvTdwO_hiLUgjd1s52EzGArYfNy0GTqcuv8MADYaMkJvH

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe
    "C:\Users\Admin\AppData\Local\Temp\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Users\Admin\AppData\Local\Temp\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe
      "C:\Users\Admin\AppData\Local\Temp\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe"
      2⤵
        PID:4628
      • C:\Users\Admin\AppData\Local\Temp\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe
        "C:\Users\Admin\AppData\Local\Temp\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ede5c03ac90316dd72af13836732e0749659b483b3a400f73d57a62a4e3b7f86.exe.log

      Filesize

      2KB

      MD5

      93d52c1bc7c38d958583ebbd3dc09cd4

      SHA1

      4c5ee6f9c9ae190c9a0cccb91fa2257ddcb8b0d5

      SHA256

      2905f3a06dd8907ddbcbe64389cffcc8a5273d1822e25f8bea385bdd01653c76

      SHA512

      dfc55c3247d7734c5a531fb5a3de689e8bb823e82c14ad6cab16923d50d51e03e5e86165a7d65b3059a66b67968b611368b010a6d9f755916b01ef7b67c5228e

    • memory/532-10-0x0000000007CE0000-0x0000000007D5C000-memory.dmp

      Filesize

      496KB

    • memory/532-1-0x0000000000820000-0x00000000008C4000-memory.dmp

      Filesize

      656KB

    • memory/532-4-0x0000000005490000-0x0000000005522000-memory.dmp

      Filesize

      584KB

    • memory/532-3-0x0000000005960000-0x0000000005F04000-memory.dmp

      Filesize

      5.6MB

    • memory/532-6-0x00000000058B0000-0x00000000058C8000-memory.dmp

      Filesize

      96KB

    • memory/532-5-0x0000000005590000-0x000000000559A000-memory.dmp

      Filesize

      40KB

    • memory/532-8-0x0000000005900000-0x000000000590A000-memory.dmp

      Filesize

      40KB

    • memory/532-11-0x00000000065E0000-0x000000000667C000-memory.dmp

      Filesize

      624KB

    • memory/532-7-0x00000000058F0000-0x00000000058F8000-memory.dmp

      Filesize

      32KB

    • memory/532-2-0x00000000053A0000-0x00000000053B0000-memory.dmp

      Filesize

      64KB

    • memory/532-9-0x00000000053A0000-0x00000000053B0000-memory.dmp

      Filesize

      64KB

    • memory/532-0-0x0000000075330000-0x0000000075AE0000-memory.dmp

      Filesize

      7.7MB

    • memory/532-15-0x0000000075330000-0x0000000075AE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1316-19-0x0000000006620000-0x0000000006670000-memory.dmp

      Filesize

      320KB

    • memory/1316-18-0x0000000005940000-0x0000000005950000-memory.dmp

      Filesize

      64KB

    • memory/1316-17-0x0000000075330000-0x0000000075AE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1316-16-0x0000000005950000-0x00000000059B6000-memory.dmp

      Filesize

      408KB

    • memory/1316-12-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1316-20-0x0000000075330000-0x0000000075AE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1316-21-0x0000000005940000-0x0000000005950000-memory.dmp

      Filesize

      64KB