Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2023 18:13

General

  • Target

    2387d52a300ae750ad5355ebd55261d3d67ef6ee6227c43bcfe09031bced5276exe.exe

  • Size

    91KB

  • MD5

    6fd58c0999a96de060ad3ab30ae96f66

  • SHA1

    8b1a67969dbcb5ef5deb3a6692125fa297ce87dd

  • SHA256

    2387d52a300ae750ad5355ebd55261d3d67ef6ee6227c43bcfe09031bced5276

  • SHA512

    67e568470d9f4ea1ae9f35fc445abac32e6d6f6d48ab60f567890c47b8f1d72004f9ae60d1370911aeed36ce37ada701f5c1e040d38bde4fd68f2d0fb541424a

  • SSDEEP

    768:CUV3CZnantlidfvVjwsPYzjRNV2OO2dv7ntUwoS0INTuunHxPxGxOuCMJvbc:qcfeilvjtpoS0INdnexOuCMJvbc

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mailbuilderbuilder.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Alluminio.1

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2387d52a300ae750ad5355ebd55261d3d67ef6ee6227c43bcfe09031bced5276exe.exe
    "C:\Users\Admin\AppData\Local\Temp\2387d52a300ae750ad5355ebd55261d3d67ef6ee6227c43bcfe09031bced5276exe.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\2387d52a300ae750ad5355ebd55261d3d67ef6ee6227c43bcfe09031bced5276exe.exe
      C:\Users\Admin\AppData\Local\Temp\2387d52a300ae750ad5355ebd55261d3d67ef6ee6227c43bcfe09031bced5276exe.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3572
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4992
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2040-8-0x0000000006CB0000-0x0000000006CF0000-memory.dmp

      Filesize

      256KB

    • memory/2040-15-0x0000000075300000-0x0000000075AB0000-memory.dmp

      Filesize

      7.7MB

    • memory/2040-9-0x0000000006CF0000-0x0000000006D3C000-memory.dmp

      Filesize

      304KB

    • memory/2040-3-0x00000000056A0000-0x0000000005732000-memory.dmp

      Filesize

      584KB

    • memory/2040-4-0x00000000057E0000-0x00000000057F0000-memory.dmp

      Filesize

      64KB

    • memory/2040-5-0x0000000005660000-0x000000000566A000-memory.dmp

      Filesize

      40KB

    • memory/2040-6-0x0000000006AA0000-0x0000000006AF8000-memory.dmp

      Filesize

      352KB

    • memory/2040-7-0x0000000006B70000-0x0000000006BB0000-memory.dmp

      Filesize

      256KB

    • memory/2040-2-0x0000000005BB0000-0x0000000006154000-memory.dmp

      Filesize

      5.6MB

    • memory/2040-1-0x0000000075300000-0x0000000075AB0000-memory.dmp

      Filesize

      7.7MB

    • memory/2040-11-0x00000000057E0000-0x00000000057F0000-memory.dmp

      Filesize

      64KB

    • memory/2040-10-0x0000000075300000-0x0000000075AB0000-memory.dmp

      Filesize

      7.7MB

    • memory/2040-0-0x0000000000C50000-0x0000000000C6C000-memory.dmp

      Filesize

      112KB

    • memory/2780-38-0x000002D724140000-0x000002D724150000-memory.dmp

      Filesize

      64KB

    • memory/2780-57-0x000002D72C470000-0x000002D72C471000-memory.dmp

      Filesize

      4KB

    • memory/2780-56-0x000002D72C470000-0x000002D72C471000-memory.dmp

      Filesize

      4KB

    • memory/2780-58-0x000002D72C580000-0x000002D72C581000-memory.dmp

      Filesize

      4KB

    • memory/2780-54-0x000002D72C440000-0x000002D72C441000-memory.dmp

      Filesize

      4KB

    • memory/2780-22-0x000002D724040000-0x000002D724050000-memory.dmp

      Filesize

      64KB

    • memory/3572-12-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3572-21-0x00000000058C0000-0x00000000058D0000-memory.dmp

      Filesize

      64KB

    • memory/3572-20-0x0000000075300000-0x0000000075AB0000-memory.dmp

      Filesize

      7.7MB

    • memory/3572-19-0x00000000070F0000-0x000000000718C000-memory.dmp

      Filesize

      624KB

    • memory/3572-18-0x0000000007000000-0x0000000007050000-memory.dmp

      Filesize

      320KB

    • memory/3572-16-0x00000000058C0000-0x00000000058D0000-memory.dmp

      Filesize

      64KB

    • memory/3572-17-0x0000000005B10000-0x0000000005B76000-memory.dmp

      Filesize

      408KB

    • memory/3572-14-0x0000000075300000-0x0000000075AB0000-memory.dmp

      Filesize

      7.7MB