Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 04:42

General

  • Target

    b3d2974e884a55f91e356067b1b03ee2f3772254df4cba83e64b84570ba7bfe0.exe

  • Size

    133KB

  • MD5

    85123c41c1ba749deb56bf21f10a9309

  • SHA1

    e61f6db6962f486b3546b8f37157e295985367fc

  • SHA256

    b3d2974e884a55f91e356067b1b03ee2f3772254df4cba83e64b84570ba7bfe0

  • SHA512

    781315ca2b0493376bd5ace2509a3c44cc0d4e18102388783a5ec0630786d8fdcb08751d77b89016457470799a2cbd320f01bb95d90b6cd1d0302d39b09cbe47

  • SSDEEP

    3072:igmQTanuiRs37DrZ/c7GmCMY7pdk5nrTIXAJ:O1bRs37DZhATqAJ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.normagroup.com.tr
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    $%M4,p)]vd1=

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 5 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 5 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 5 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 5 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 5 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3d2974e884a55f91e356067b1b03ee2f3772254df4cba83e64b84570ba7bfe0.exe
    "C:\Users\Admin\AppData\Local\Temp\b3d2974e884a55f91e356067b1b03ee2f3772254df4cba83e64b84570ba7bfe0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf909985848a0fe014086e4c316831c1

    SHA1

    c31c181c8d9620bfedca997f50e57f13f8d9a2fa

    SHA256

    264d17ca6974a3fe120cecf158f7881455d9e156a11f72a0a650ccddd8daec7b

    SHA512

    43a6619febc26379fd581b8bcf40b4a40a6346d5503d95bdde75bf28b5d74b4a77fda4380a2a55cf79ee0dbc22aab4526b70f320065d1dfee736ce280d08f0f1

  • C:\Users\Admin\AppData\Local\Temp\Cab4655.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4771.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1704-0-0x0000000000930000-0x0000000000954000-memory.dmp

    Filesize

    144KB

  • memory/1704-1-0x0000000074070000-0x000000007475E000-memory.dmp

    Filesize

    6.9MB

  • memory/1704-2-0x0000000004760000-0x00000000047A0000-memory.dmp

    Filesize

    256KB

  • memory/1704-74-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/1704-84-0x0000000074070000-0x000000007475E000-memory.dmp

    Filesize

    6.9MB

  • memory/2392-79-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-78-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-77-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2392-81-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-75-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-83-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-86-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2392-87-0x0000000074070000-0x000000007475E000-memory.dmp

    Filesize

    6.9MB

  • memory/2392-88-0x0000000004BD0000-0x0000000004C10000-memory.dmp

    Filesize

    256KB

  • memory/2392-89-0x0000000074070000-0x000000007475E000-memory.dmp

    Filesize

    6.9MB

  • memory/2392-90-0x0000000004BD0000-0x0000000004C10000-memory.dmp

    Filesize

    256KB