Analysis

  • max time kernel
    24s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 17:33

General

  • Target

    LBDXZOJZ.exe

  • Size

    679KB

  • MD5

    143bcd7eedd7bba4d27a270b7e3710f0

  • SHA1

    0ca36b8a46dbaa099d75e2a9ff5aadffd7924f07

  • SHA256

    7f2bd5ae74aa8c987865c6e8e2ba9f92b6cd157cf285c6f545755bc7158b2cef

  • SHA512

    b6ab3b6105b9d35d8b12dcb7a392b7b8334f66535fa288faaec16ccf772f0d68da1ffb9bd69eec36d6c4ef3176eadc03529e5072a4263e779a20ef0fcfc80458

  • SSDEEP

    12288:+645+po2MHuPxYXmY7yAkwzY4B7haW2z7WEKGxtja9I:+Z+pJHRoB7haWJxUkI

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LBDXZOJZ.exe
    "C:\Users\Admin\AppData\Local\Temp\LBDXZOJZ.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\LBDXZOJZ.exe
      "C:\Users\Admin\AppData\Local\Temp\LBDXZOJZ.exe"
      2⤵
        PID:2712
      • C:\Users\Admin\AppData\Local\Temp\LBDXZOJZ.exe
        "C:\Users\Admin\AppData\Local\Temp\LBDXZOJZ.exe"
        2⤵
          PID:2564
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zxuvCjJtE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6B41.tmp"
          2⤵
          • Creates scheduled task(s)
          PID:2204
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zxuvCjJtE.exe"
          2⤵
            PID:1868

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp6B41.tmp

          Filesize

          1KB

          MD5

          ad14c1d9a0e8c9db7f5ef3f68acd9cd2

          SHA1

          e012cdd9de38c3a7be0f456bb5a3e69eaf9390c0

          SHA256

          0d1b98b331136aa3646a4fb01de48cc65b9163f11cc5c6a336b56ea50fcce4d6

          SHA512

          eae2c50996a8d19774bb2fe6a5fa281d854d491cbc130a359f7c7111c088f615aa748520a262b74143d3fe137dd453abdb5959c1f77823d41cbd627953d0cf1f

        • memory/1392-29-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1392-0-0x0000000001390000-0x000000000143E000-memory.dmp

          Filesize

          696KB

        • memory/1392-2-0x0000000004BE0000-0x0000000004C20000-memory.dmp

          Filesize

          256KB

        • memory/1392-3-0x00000000003C0000-0x00000000003D8000-memory.dmp

          Filesize

          96KB

        • memory/1392-5-0x0000000000470000-0x000000000047A000-memory.dmp

          Filesize

          40KB

        • memory/1392-4-0x00000000003E0000-0x00000000003E8000-memory.dmp

          Filesize

          32KB

        • memory/1392-6-0x0000000005C30000-0x0000000005CAC000-memory.dmp

          Filesize

          496KB

        • memory/1392-7-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1392-8-0x0000000004BE0000-0x0000000004C20000-memory.dmp

          Filesize

          256KB

        • memory/1392-1-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/1868-36-0x0000000002940000-0x0000000002980000-memory.dmp

          Filesize

          256KB

        • memory/1868-31-0x0000000002940000-0x0000000002980000-memory.dmp

          Filesize

          256KB

        • memory/1868-37-0x000000006C570000-0x000000006CB1B000-memory.dmp

          Filesize

          5.7MB

        • memory/1868-34-0x0000000002940000-0x0000000002980000-memory.dmp

          Filesize

          256KB

        • memory/1868-30-0x000000006C570000-0x000000006CB1B000-memory.dmp

          Filesize

          5.7MB

        • memory/1868-32-0x000000006C570000-0x000000006CB1B000-memory.dmp

          Filesize

          5.7MB

        • memory/2712-26-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-35-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2712-28-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2712-24-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-21-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-33-0x0000000001270000-0x00000000012B0000-memory.dmp

          Filesize

          256KB

        • memory/2712-20-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-16-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-14-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2712-38-0x00000000749F0000-0x00000000750DE000-memory.dmp

          Filesize

          6.9MB