Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
KLM093778373.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KLM093778373.exe
Resource
win10v2004-20231215-en
General
-
Target
KLM093778373.exe
-
Size
170KB
-
MD5
794221c770d3a022d565153190b5fe8b
-
SHA1
1bb7a79856b614c6925e2e99a4005c55f471fc8f
-
SHA256
5ab03258f60ece5b9b7d1681d56de20af50eb9783a3f1b84a5f683f14c7a6471
-
SHA512
c41ca1008f39edd0b16e89cb1cbbcb985497c0d2753458be674840efb3b83aaf04f907d15ccbf1872238c1616ae8ff048bc0fc247f26370e978908550f78e9a9
-
SSDEEP
3072:i54NFWQvWOWyM07kkIIZB7Joi/y7oQPypIMT88DCjKeDwnehokG1Lq2Jkp4H2xVX:FNFWQMMtbZIicypIMT88DCjKeDwnehom
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6248079103:AAHguAsTEqW6RfyeC5Wjh_pmDy9cvQi28aU/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KLM093778373.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KLM093778373.exe Powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KLM093778373.exe Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KLM093778373.exe Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KLM093778373.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 api.ipify.org 32 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 392 set thread context of 3888 392 KLM093778373.exe 98 -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 832 Powershell.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 392 KLM093778373.exe 832 Powershell.exe 392 KLM093778373.exe 392 KLM093778373.exe 3888 KLM093778373.exe 3888 KLM093778373.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 392 KLM093778373.exe Token: SeDebugPrivilege 832 Powershell.exe Token: SeDebugPrivilege 3888 KLM093778373.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3888 KLM093778373.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 392 wrote to memory of 832 392 KLM093778373.exe 95 PID 392 wrote to memory of 832 392 KLM093778373.exe 95 PID 392 wrote to memory of 832 392 KLM093778373.exe 95 PID 392 wrote to memory of 4292 392 KLM093778373.exe 97 PID 392 wrote to memory of 4292 392 KLM093778373.exe 97 PID 392 wrote to memory of 4292 392 KLM093778373.exe 97 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 PID 392 wrote to memory of 3888 392 KLM093778373.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KLM093778373.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 KLM093778373.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe"C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KLM093778373.exe' -Force2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe"C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe"2⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe"C:\Users\Admin\AppData\Local\Temp\KLM093778373.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c963d2a62d71acea1279f33286e3f38e
SHA11862de543ef7ce01494ceba01306aba99cba0b04
SHA256420e4071f06a86ae97fcfbb2b81bc4f4bac330c17c10bcb91e24c4099a26f0a6
SHA512ba0d0c25f2ebb5fad4739c9100af0be88e6fb809fab301518705ba4dce4455d7522a411ad88419b9bae32bf95d3c3396fcac27ce9feda51787aeb88da4f79e52
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82