Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2023 01:49

General

  • Target

    55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe

  • Size

    763KB

  • MD5

    f1bd9d7b95c0574bce081b4db67d9ac0

  • SHA1

    d0d03d247ab719476973ac4baa4cb6f1f7bc2bec

  • SHA256

    55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623

  • SHA512

    dc4e02f93eb46183674aaed63b7a7705e6c5e758092ea582d7e0fb46ef5606b581eecbb3bebae648bfe5b0b3bab4a8e9bb3f5658a3afed1b53e860a88db244f8

  • SSDEEP

    12288:4Nvq/IeD0XjZlSk0MCCbg/igCk/nUGaujjGGxXrTZYAO35XSnd2+k+koaNS:4lq/UFlEMCC8bva+/rrOJi

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6336364775:AAEDkjlLajiBt-8GN_k5ZdqGEnltWbPdH20/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe
    "C:\Users\Admin\AppData\Local\Temp\55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\55817a7453cd777b0ae9a0cc0c49358e6012558a55df445233098b4dc1de2623.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1528
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OcJWPsN.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2068
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OcJWPsN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4BFE.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2556
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp4BFE.tmp

    Filesize

    1KB

    MD5

    c7dc72c49e89891194eddc549dfd6aa5

    SHA1

    4df426a37666a96078a801544cd704ea6dba1231

    SHA256

    c8ad7aba8f24e11460ae4692b57dda330476743a385be0c696aacad3b21efd66

    SHA512

    a0208f569060b0676ec1751eee95225189bc113620388a3cbfd14bcfed1f8c02a18feb6a3d33da6daeb3179e198249b2d8b775e54645fdf1b2a6fce8333072a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0ETAZS85PPPAB3V2W8OH.temp

    Filesize

    7KB

    MD5

    29e73827b796f9920c71df2138d37385

    SHA1

    07e1460a0de3bf73a4f0cd1fe5a603d95dd79984

    SHA256

    6f120d6c9263a0c5d8c58072fc1c4e94c836c34d08a961d35221dd7e57ca4aaa

    SHA512

    3c9ae6caabe7f70222f661be0da18f03b0d62d47f846e7afd10166ba112361b3fb84173777f669d12484a7120891bec9f9e63aec8dbee044dee569b20b6aebbe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    29e73827b796f9920c71df2138d37385

    SHA1

    07e1460a0de3bf73a4f0cd1fe5a603d95dd79984

    SHA256

    6f120d6c9263a0c5d8c58072fc1c4e94c836c34d08a961d35221dd7e57ca4aaa

    SHA512

    3c9ae6caabe7f70222f661be0da18f03b0d62d47f846e7afd10166ba112361b3fb84173777f669d12484a7120891bec9f9e63aec8dbee044dee569b20b6aebbe

  • memory/1476-4-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1476-36-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1476-5-0x0000000000340000-0x000000000034A000-memory.dmp

    Filesize

    40KB

  • memory/1476-6-0x00000000011E0000-0x000000000127C000-memory.dmp

    Filesize

    624KB

  • memory/1476-3-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1476-2-0x0000000000D90000-0x0000000000DD0000-memory.dmp

    Filesize

    256KB

  • memory/1476-1-0x00000000748A0000-0x0000000074F8E000-memory.dmp

    Filesize

    6.9MB

  • memory/1476-0-0x00000000012C0000-0x0000000001384000-memory.dmp

    Filesize

    784KB

  • memory/1528-41-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1528-22-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1528-24-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/1528-38-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/1528-29-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/1528-28-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2068-33-0x0000000002AB0000-0x0000000002AF0000-memory.dmp

    Filesize

    256KB

  • memory/2068-31-0x0000000002AB0000-0x0000000002AF0000-memory.dmp

    Filesize

    256KB

  • memory/2068-26-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2068-46-0x0000000002AB0000-0x0000000002AF0000-memory.dmp

    Filesize

    256KB

  • memory/2068-40-0x0000000002AB0000-0x0000000002AF0000-memory.dmp

    Filesize

    256KB

  • memory/2068-42-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2068-19-0x000000006F4A0000-0x000000006FA4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2828-39-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-32-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2828-23-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-35-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-20-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-25-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-44-0x0000000004760000-0x00000000047A0000-memory.dmp

    Filesize

    256KB

  • memory/2828-45-0x00000000735A0000-0x0000000073C8E000-memory.dmp

    Filesize

    6.9MB

  • memory/2828-47-0x0000000004760000-0x00000000047A0000-memory.dmp

    Filesize

    256KB

  • memory/2828-21-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2828-48-0x00000000735A0000-0x0000000073C8E000-memory.dmp

    Filesize

    6.9MB