Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 01:15

General

  • Target

    fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd.exe

  • Size

    708KB

  • MD5

    d96631c2c4d020c3d75b72da21e9051e

  • SHA1

    95c2021b7cc3ce36d008870fcf9b9a4e6317a560

  • SHA256

    fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd

  • SHA512

    86ced6534e455047debc67864e7dbe723cd6abbbc87047ad701dd7e9666b71e1ea2e6b325077e27a37c26ac752cae9791afbe9e4507f18308c64ed302f8660a8

  • SSDEEP

    12288:BgKqpu+C7T/zchdGnysmYxKG6KflixwwlEnK/xYKZCvtTEtBhzBh3wdkR:BgKqpkXzchdEmYkG5flixwwlBxEFT6fF

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd.exe
    "C:\Users\Admin\AppData\Local\Temp\fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\fc443da9c980fb8692d8febdf63ec1777e3c16d30084c52c9c16fc4411da54cd.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2492
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rJGTmC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rJGTmC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4D17.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2536
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp4D17.tmp

    Filesize

    1KB

    MD5

    9083c72270290f3ff84d45dc1bc42d4a

    SHA1

    dc91239d341807a76dffa36887f8b68ea140b747

    SHA256

    559e4159dd9e731fe1255fc50b6f76335f47d715572c313738882418e4ce464c

    SHA512

    8c698f136af172c2f8453bc16a28152292c83f5f06334b69e6fec4c629e58abda7c246aff2ed93f7a2d1b54340e5e1fca03224baa16768c38377b0f2bac738cf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GWIXW5S084ETHUAEE06G.temp

    Filesize

    7KB

    MD5

    241fe6db241221ee7d847fbc4902d3a6

    SHA1

    b48fbd7c2b8f01727382283782e57154fdc4964c

    SHA256

    00f94981a7486e620b4a4764e9a5211ab078d7b4ca32b00fa3b7d110c593d5d6

    SHA512

    afb3f8f4162c70ad2d8c1a233f89b365c10055276d5705d8ce8d209a824babe7c824ddc8626f81b53512036f5095db0d682d50ee85ff90e552fb9ec27d990a20

  • memory/1728-43-0x0000000074500000-0x0000000074BEE000-memory.dmp

    Filesize

    6.9MB

  • memory/1728-3-0x00000000004F0000-0x0000000000510000-memory.dmp

    Filesize

    128KB

  • memory/1728-4-0x00000000004C0000-0x00000000004CE000-memory.dmp

    Filesize

    56KB

  • memory/1728-5-0x0000000000510000-0x0000000000522000-memory.dmp

    Filesize

    72KB

  • memory/1728-6-0x0000000005340000-0x00000000053C2000-memory.dmp

    Filesize

    520KB

  • memory/1728-2-0x00000000012D0000-0x0000000001310000-memory.dmp

    Filesize

    256KB

  • memory/1728-0-0x0000000001380000-0x0000000001434000-memory.dmp

    Filesize

    720KB

  • memory/1728-1-0x0000000074500000-0x0000000074BEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2492-38-0x0000000002850000-0x0000000002890000-memory.dmp

    Filesize

    256KB

  • memory/2492-36-0x0000000002850000-0x0000000002890000-memory.dmp

    Filesize

    256KB

  • memory/2492-24-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-34-0x0000000002850000-0x0000000002890000-memory.dmp

    Filesize

    256KB

  • memory/2492-47-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-27-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-20-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB

  • memory/2500-31-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2500-49-0x0000000074500000-0x0000000074BEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2500-45-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2500-39-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2500-28-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2500-46-0x0000000074500000-0x0000000074BEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2500-25-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2500-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2500-42-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2756-40-0x0000000001CC0000-0x0000000001D00000-memory.dmp

    Filesize

    256KB

  • memory/2756-30-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-32-0x0000000001CC0000-0x0000000001D00000-memory.dmp

    Filesize

    256KB

  • memory/2756-48-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-22-0x0000000001CC0000-0x0000000001D00000-memory.dmp

    Filesize

    256KB

  • memory/2756-19-0x000000006F0B0000-0x000000006F65B000-memory.dmp

    Filesize

    5.7MB