Analysis

  • max time kernel
    154s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 06:00

General

  • Target

    rev_new order2024pdf.exe

  • Size

    532KB

  • MD5

    1a81a4bbb804f4d4c3567b8f4b15f1fd

  • SHA1

    7c89ec25ff92f9ce5919eaae654bdcfa342b99db

  • SHA256

    d1ccb1bacee1f1f9662a7a17575937a05111fef02d0756cb29c538c8e2b45022

  • SHA512

    7602cd9a3772d95ca86e3e3002d45d103d054c6d2936749ca1dbd6f456fc8df809300bee9e3e8b5911e2c6de249bd7a6751118705461ec3a9ec1f02798bb270d

  • SSDEEP

    6144:WGpoY5A5QA2vVVnSNMJu+V1wv0ZlDeG4dCJP2+8HP778cpm4VHXT11d9z74Mm8NV:WGzEt2rKHcfe6JH05meXT1Lh7OeLpT

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4636
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2628 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsw3BBD.tmp\System.dll

      Filesize

      12KB

      MD5

      4add245d4ba34b04f213409bfe504c07

      SHA1

      ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

      SHA256

      9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

      SHA512

      1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

    • memory/2296-15-0x0000000004D70000-0x0000000005F45000-memory.dmp

      Filesize

      17.8MB

    • memory/2296-16-0x0000000004D70000-0x0000000005F45000-memory.dmp

      Filesize

      17.8MB

    • memory/2296-17-0x0000000076FC1000-0x00000000770E1000-memory.dmp

      Filesize

      1.1MB

    • memory/2296-18-0x0000000073E20000-0x0000000073E27000-memory.dmp

      Filesize

      28KB

    • memory/2296-37-0x0000000004D70000-0x0000000005F45000-memory.dmp

      Filesize

      17.8MB

    • memory/4636-36-0x0000000076FC1000-0x00000000770E1000-memory.dmp

      Filesize

      1.1MB

    • memory/4636-39-0x00000000007F0000-0x0000000000834000-memory.dmp

      Filesize

      272KB

    • memory/4636-31-0x00000000007F0000-0x0000000001A44000-memory.dmp

      Filesize

      18.3MB

    • memory/4636-35-0x00000000007F0000-0x0000000001A44000-memory.dmp

      Filesize

      18.3MB

    • memory/4636-20-0x0000000077048000-0x0000000077049000-memory.dmp

      Filesize

      4KB

    • memory/4636-19-0x0000000001A50000-0x0000000002C25000-memory.dmp

      Filesize

      17.8MB

    • memory/4636-38-0x0000000071570000-0x0000000071D20000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-21-0x0000000077065000-0x0000000077066000-memory.dmp

      Filesize

      4KB

    • memory/4636-40-0x0000000035920000-0x0000000035EC4000-memory.dmp

      Filesize

      5.6MB

    • memory/4636-42-0x0000000035FC0000-0x0000000035FD0000-memory.dmp

      Filesize

      64KB

    • memory/4636-41-0x0000000001A50000-0x0000000002C25000-memory.dmp

      Filesize

      17.8MB

    • memory/4636-43-0x0000000035850000-0x00000000358B6000-memory.dmp

      Filesize

      408KB

    • memory/4636-45-0x00000000367D0000-0x0000000036820000-memory.dmp

      Filesize

      320KB

    • memory/4636-47-0x0000000071570000-0x0000000071D20000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-49-0x0000000035FC0000-0x0000000035FD0000-memory.dmp

      Filesize

      64KB