Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
3ab485299c39c8a89e0d7031a8d0ab6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ab485299c39c8a89e0d7031a8d0ab6b.exe
Resource
win10v2004-20231215-en
General
-
Target
3ab485299c39c8a89e0d7031a8d0ab6b.exe
-
Size
859KB
-
MD5
3ab485299c39c8a89e0d7031a8d0ab6b
-
SHA1
7fd60290d1e9605914b7c911ebd397cd4c462e46
-
SHA256
7c09535cd87ef7bd13d91b73e029c904c8905b700d935e39d9375c60bf17fb71
-
SHA512
1118ee9ef51bdde20b23ef622fea1513f17951a9d0f2b1ad167405849c3cd2769d08d8c9cca2f47eaf323b199ac71474956af996924618b14c39da8a356be322
-
SSDEEP
12288:4NUKrOl2dZbnt5h45tQ/VZmZkZYKHiu7zCy4zof8CWiiNsqbVHa4QPKuJ:4NHql2dZr945t8VZmZkK7wuBm8jFVHa
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
MAIL.aldhanna.com - Port:
587 - Username:
[email protected] - Password:
Aldhanna@2020
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4996-16-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3ab485299c39c8a89e0d7031a8d0ab6b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3ab485299c39c8a89e0d7031a8d0ab6b.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3ab485299c39c8a89e0d7031a8d0ab6b.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 3ab485299c39c8a89e0d7031a8d0ab6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4924 set thread context of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4996 3ab485299c39c8a89e0d7031a8d0ab6b.exe 4996 3ab485299c39c8a89e0d7031a8d0ab6b.exe 4996 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4996 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4924 wrote to memory of 1052 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 101 PID 4924 wrote to memory of 1052 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 101 PID 4924 wrote to memory of 1052 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 101 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 PID 4924 wrote to memory of 4996 4924 3ab485299c39c8a89e0d7031a8d0ab6b.exe 103 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3ab485299c39c8a89e0d7031a8d0ab6b.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3ab485299c39c8a89e0d7031a8d0ab6b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ab485299c39c8a89e0d7031a8d0ab6b.exe"C:\Users\Admin\AppData\Local\Temp\3ab485299c39c8a89e0d7031a8d0ab6b.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fNXEYRQBk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBA95.tmp"2⤵
- Creates scheduled task(s)
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\3ab485299c39c8a89e0d7031a8d0ab6b.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4996
-