Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2023 01:13

General

  • Target

    01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe

  • Size

    403KB

  • MD5

    c081e925d1f5ffa3057680b76e354141

  • SHA1

    fe2a4b9d382fffe418d34d101785ce7a787c6aa0

  • SHA256

    01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8

  • SHA512

    14c554c4c2bccb5ce9299f4cbdf1bd1fd318d4e37ad77cbbf765ae04b539a896c33050c399cc0357ac74e3893a54805d5b2ceffbf5bc32ae4ecdb6b80b6ed6ae

  • SSDEEP

    12288:D94/XlCUvQt1apQ7ERtLJ7N/vMmbCH/a9:DO5vzpvLJ7N3vCHS9

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.siscop.com.co
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    +5s48Ia2&-(t

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
    "C:\Users\Admin\AppData\Local\Temp\01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe
      "C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe
        "C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe

    Filesize

    165KB

    MD5

    9bfe9255e6c071d5085cb8fe04470d4d

    SHA1

    8bbdac8c049f4c0ca91f54b68a845c53cd4c1169

    SHA256

    842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e

    SHA512

    e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15

  • C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe

    Filesize

    165KB

    MD5

    9bfe9255e6c071d5085cb8fe04470d4d

    SHA1

    8bbdac8c049f4c0ca91f54b68a845c53cd4c1169

    SHA256

    842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e

    SHA512

    e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15

  • C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe

    Filesize

    165KB

    MD5

    9bfe9255e6c071d5085cb8fe04470d4d

    SHA1

    8bbdac8c049f4c0ca91f54b68a845c53cd4c1169

    SHA256

    842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e

    SHA512

    e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15

  • C:\Users\Admin\AppData\Local\Temp\xtlzwvurz.k

    Filesize

    333KB

    MD5

    6b1c08140286d7333b668a0d387dfeb0

    SHA1

    46f2b3da75af49e6daede57d362102564c6c525d

    SHA256

    45e0101d414ac7f6378f1f39e63a1907aa1c1c7d8d74dea58ed9b3d54dad9644

    SHA512

    80d130300da51896d920b9bb17168d3a84d66c517c7523084c1727aed12199602a2d37702aedf2b529af6ccfd4da7d9d03602a988be0d54abf94d58c9f73596a

  • memory/2696-10-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2696-5-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/5020-14-0x0000000004900000-0x0000000004910000-memory.dmp

    Filesize

    64KB

  • memory/5020-18-0x0000000004900000-0x0000000004910000-memory.dmp

    Filesize

    64KB

  • memory/5020-11-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/5020-12-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/5020-13-0x0000000074580000-0x0000000074D30000-memory.dmp

    Filesize

    7.7MB

  • memory/5020-15-0x0000000004910000-0x0000000004952000-memory.dmp

    Filesize

    264KB

  • memory/5020-7-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/5020-16-0x0000000004900000-0x0000000004910000-memory.dmp

    Filesize

    64KB

  • memory/5020-17-0x00000000049B0000-0x0000000004F54000-memory.dmp

    Filesize

    5.6MB

  • memory/5020-9-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/5020-19-0x0000000005110000-0x0000000005176000-memory.dmp

    Filesize

    408KB

  • memory/5020-20-0x00000000056F0000-0x0000000005740000-memory.dmp

    Filesize

    320KB

  • memory/5020-21-0x0000000005740000-0x00000000057DC000-memory.dmp

    Filesize

    624KB

  • memory/5020-22-0x0000000005E40000-0x0000000005ED2000-memory.dmp

    Filesize

    584KB

  • memory/5020-23-0x0000000006050000-0x000000000605A000-memory.dmp

    Filesize

    40KB

  • memory/5020-25-0x0000000074580000-0x0000000074D30000-memory.dmp

    Filesize

    7.7MB

  • memory/5020-26-0x0000000004900000-0x0000000004910000-memory.dmp

    Filesize

    64KB

  • memory/5020-28-0x0000000004900000-0x0000000004910000-memory.dmp

    Filesize

    64KB

  • memory/5020-29-0x0000000004900000-0x0000000004910000-memory.dmp

    Filesize

    64KB