Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2023, 01:23

General

  • Target

    b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe

  • Size

    658KB

  • MD5

    63f813cc3cd451869e2947fbbb85707d

  • SHA1

    2a47d4dbdcff3dc8d9406acfe3cfadaa880a38f6

  • SHA256

    b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc

  • SHA512

    3b09c1fa534e4a4b3d9a1c0727b31b81c4e3110203ec08f728fd7e33d5817e3b3582321f3d5a281370ae78d508005e4473cc45464e513977082087833d13823a

  • SSDEEP

    12288:8hkZ53I3S2PQHxOLJAY8hlgLIWeT0orw9eN3kTXbpnhjt1lExFvAF:8K/OS8bSlgL2dTN0ZnhGxFvQ

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe
    "C:\Users\Admin\AppData\Local\Temp\b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vztrvWgwfoEWrd.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3056
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vztrvWgwfoEWrd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2044
    • C:\Users\Admin\AppData\Local\Temp\b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe
      "C:\Users\Admin\AppData\Local\Temp\b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe"
      2⤵
        PID:2636
      • C:\Users\Admin\AppData\Local\Temp\b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe
        "C:\Users\Admin\AppData\Local\Temp\b1e6cf070e6a18fe6d22cab1e5bd28d4ad3e97b5999471dd792a5f7a350b5ecc.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmp

      Filesize

      1KB

      MD5

      988a62cfee84bbe9da54d708d02a2917

      SHA1

      471017890fe6697d3aef862e75eeb9977d7c972a

      SHA256

      381e591dac1b9d5ed6d012768b742dc75cc1f2cbb9ba0f3946d1da98a76efdf0

      SHA512

      434ad8003a851550e6b984d89ca88d4fb53e99bc73a61ee5b9ae10a08211ea4ab92beb117e68ee4cfa8a97832d2ce8a87afa918421cc4679a42829be986f98e2

    • memory/1692-0-0x00000000001A0000-0x000000000024A000-memory.dmp

      Filesize

      680KB

    • memory/1692-1-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/1692-2-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/1692-3-0x00000000003C0000-0x00000000003DA000-memory.dmp

      Filesize

      104KB

    • memory/1692-4-0x00000000003E0000-0x00000000003E8000-memory.dmp

      Filesize

      32KB

    • memory/1692-5-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/1692-6-0x0000000005420000-0x000000000549E000-memory.dmp

      Filesize

      504KB

    • memory/1692-27-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2644-31-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-19-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2644-16-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2644-22-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2644-26-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2644-24-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2644-14-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2644-36-0x0000000000840000-0x0000000000880000-memory.dmp

      Filesize

      256KB

    • memory/2644-35-0x00000000749F0000-0x00000000750DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2644-18-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3056-33-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/3056-32-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/3056-30-0x000000006E270000-0x000000006E81B000-memory.dmp

      Filesize

      5.7MB

    • memory/3056-34-0x000000006E270000-0x000000006E81B000-memory.dmp

      Filesize

      5.7MB

    • memory/3056-29-0x00000000029C0000-0x0000000002A00000-memory.dmp

      Filesize

      256KB

    • memory/3056-28-0x000000006E270000-0x000000006E81B000-memory.dmp

      Filesize

      5.7MB