Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 01:12

General

  • Target

    a48b8204ca3d109aba4ba729519ac0f6a2220d1455f51dca72aef96a0d200338.exe

  • Size

    171KB

  • MD5

    6712cbb5c19fb549c7dc9f581627a419

  • SHA1

    539d2c689375899c7d5665fe9b112321a29e6a04

  • SHA256

    a48b8204ca3d109aba4ba729519ac0f6a2220d1455f51dca72aef96a0d200338

  • SHA512

    6f853842a15e29179eadb7c7b49bc06eb365dc19517c4ec8baa9ef9363e64e99eda2fc12d84f1d75c00718ae8f58c9cc060d67807522e50ba166137215b7059e

  • SSDEEP

    1536:r+582BRECPAtU/xu/ulwDKh6VDLs1ZD6+uN88JqhIY/3yRYAu9Vhnr:r+58SRECPA6/xu/qw7D5+eWIYwYdNr

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6901757045:AAECHdJgM-9SB9wlIc9C6zp-keuy5Tgv0OY/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • UAC bypass 3 TTPs 1 IoCs
  • Contacts a large (4260) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a48b8204ca3d109aba4ba729519ac0f6a2220d1455f51dca72aef96a0d200338.exe
    "C:\Users\Admin\AppData\Local\Temp\a48b8204ca3d109aba4ba729519ac0f6a2220d1455f51dca72aef96a0d200338.exe"
    1⤵
    • UAC bypass
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1092
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a48b8204ca3d109aba4ba729519ac0f6a2220d1455f51dca72aef96a0d200338.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:18668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:18716
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
        PID:18984

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            67KB

            MD5

            753df6889fd7410a2e9fe333da83a429

            SHA1

            3c425f16e8267186061dd48ac1c77c122962456e

            SHA256

            b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

            SHA512

            9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            bac12220621b5d1a3bb74dce60b80baa

            SHA1

            4af30917c0df7161f8e67287dc660e6e9893e0c2

            SHA256

            2fe8090b3579d9727cbffbf2dcd67d1ebe22f06f4d71dd184841b0144431fd3a

            SHA512

            87ae5236493bcad2f3d76b9e6a71dc11897c8a68abf85eb54cf2407b1bc2dfbadbd2ecb27a28445cdaa8255b88d8a28b027e0a03024be24a35b21c8eac4f738c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            dfe4291b3e218755df627b3871d6d399

            SHA1

            d8283e99d31f50a35344ad0ecd20835a768d2dc5

            SHA256

            73ef8d4f506a19392e4c105b474f1a513920f5ee90be31b619513551eb944751

            SHA512

            805e642583fa59af7b9b4117273d03ce603b4974cb9b68c6b1118483e86161b800d2a105482bfb2ecd5a04849b9dc0fb8dd84a195168022449211f7ed06a8402

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            9ca5e80cf07c8593b9d53a5aefb90a85

            SHA1

            20c7a3acc85ef2f48d56ffb20d325ad4838351a3

            SHA256

            fd7f4027ab1fd01de8bd875705f13f40b3a860cf70dfc213393181a18853b2ad

            SHA512

            9664c4c5a49b7470b23fb078f9c03c35fcba8a79833e75ea754db53a14027ba9b891d8d6c306c6fef388aeaa2868c08fd6989b314850cabbbec6c984aa174560

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            18c6fe45ad905d74d59842475e9ba111

            SHA1

            0ededd2fcfb642e01b83084601ff1fe68d70da67

            SHA256

            e725ac9b920d83da9e3790fbf2b4035444a60929faee9ec1b055a91f37f54ed5

            SHA512

            f645e754ba01cf21546ffac0c0112d9c0bce99b71bc53c8f5cea345f409a4cea4429deff3e8aa9a56134fe2e054a8b148a9022e128851455e6f0b0e784410736

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            7d5e949557d836bbc3d1f6d600b1e819

            SHA1

            3abfe24b4c0d3d6de042e1b2fc3ce63785131752

            SHA256

            f9ddc4fb8bced8cc071c4b72990d0aa022ecdf0f0711ce82f8adee38e7e91a3c

            SHA512

            44b2f6690ea732869baa46d60c9953e8b8373dc9b7b7db550ec9898f65c25f6b3b3e4ef80350c548f17fab291f56965a27973de350ff9e62aeefd9d492e7bc7a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            7862c8df4d2ca10c9aa334cf477adb60

            SHA1

            ae9cdb79e577c2605bdb1f0317281904695d814e

            SHA256

            34715b0b88d2945ab37adaa9da0d68e3ceeec49dcd43471fe21d4b6db0f0def8

            SHA512

            517acc17cdbdfab82add2ab859cec3e05bc9752631ab333a2657b0dd6ddcde92a24faff06c581e530b8f5d2fcd3896d89acc6030240354aaf9119d62862c2e1f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            a9da4d389cd8c482af6f5be67c94e290

            SHA1

            0070f5e3af883e9ee2691f906f9e5afbe686c6b7

            SHA256

            ce6737abd334ae6f8958c9cd367093f89d1c164e8fd49d3757bca177e55b497b

            SHA512

            1313db69f138ccc5dfbf1bd1ed312a5e20266d0dedfb56ffdd056067eab6fe0ccf8a7725eb2c0a7353c4596247893e77c99466aa4055355dccd908d6c6f7f6be

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            40900bbf295ed4732680c57482554125

            SHA1

            d746703850f97e3268283a233f3b88238f2855b7

            SHA256

            cad12b8a5d96f2074ef33600b2eb9ac8bc25a7239e4123e35b53ab13a4140862

            SHA512

            895c7526b5da73844487e9f421dd99ed2e7defeef7afba58e4078bfb3b2c98776ac276599bd6c27b2677c717966cf009c3f9c853e195861ca5c2b718deb188f3

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            7b758ecc90a337d656039df2d7eef11c

            SHA1

            28f1fe28c673a9fdf8ec23787b7dd32509c1f118

            SHA256

            896bcb0172bf563d866097dc2ca389110aadef1b1a677bae3d34540af62f5bb1

            SHA512

            d8d27ebf3364c1246e97b089397f69359728ae3d8cf95b7afdea5e62a79131083775236b8c49d94355342547ff8b3556a4d360c94197d2c3177865ef63e73f12

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            00d612f779d7107006c871a90f35db81

            SHA1

            58a4cde6304c4b7eb32009b098af4f6cefefab65

            SHA256

            10ba980d98928e885cc5d8a9d34feaf25535313aee074e5b6fbda81dfcf59f01

            SHA512

            86eb1ebea49ee48e35ed3bd22cf7c5abbc40f275882516e29ecf4c8b5e496c85bcbbc8f83854ace48b68db7a6b74befe7cdb0ec293f366816a1f3573b03b1d5e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            33b5f844e4be4edacdc0ecd3889612d5

            SHA1

            e2e8ed94d2b398583218e0967dba9347c8a159cf

            SHA256

            cb183c6c52427189f92926b5ba45ba82ba66d1467d6ba806fe34ab4f4b0f475b

            SHA512

            1ca6a931c47ef68985553cec5eb5937627b20f41739213854aa2ab6fa83505bbd3a57e1b41ff3acc7df724fb2a3b381968654ec427bd5fccf7b7dd0560555a1d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            9a6bbf62a95baee3d3eabc12d210a9b8

            SHA1

            61d09232dfa850ff18abd89c599dbc3e1cbbb63e

            SHA256

            bb571caf8d3b1f6368ba6b78954703fb84e1689ca5ed63dee651c769109f39b0

            SHA512

            2e6bd03186d87081dae9513030e3391b91b2ea8ad0c3073a4214b9c070cc984df9a260502d4657f710d53d3ce2d56470aefe4dee7b56ff7a0df619dc6a27db4f

          • C:\Users\Admin\AppData\Local\Temp\Tar5548.tmp

            Filesize

            175KB

            MD5

            dd73cead4b93366cf3465c8cd32e2796

            SHA1

            74546226dfe9ceb8184651e920d1dbfb432b314e

            SHA256

            a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

            SHA512

            ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

          • memory/1092-2-0x0000000000A20000-0x0000000000AA0000-memory.dmp

            Filesize

            512KB

          • memory/1092-1-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

            Filesize

            9.9MB

          • memory/1092-695-0x0000000000A20000-0x0000000000AA0000-memory.dmp

            Filesize

            512KB

          • memory/1092-628-0x0000000000F40000-0x0000000000FD8000-memory.dmp

            Filesize

            608KB

          • memory/1092-674-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

            Filesize

            9.9MB

          • memory/1092-705-0x000007FEF5760000-0x000007FEF614C000-memory.dmp

            Filesize

            9.9MB

          • memory/1092-0-0x0000000001100000-0x000000000112E000-memory.dmp

            Filesize

            184KB

          • memory/18668-685-0x0000000002560000-0x0000000002568000-memory.dmp

            Filesize

            32KB

          • memory/18668-708-0x000007FEECF40000-0x000007FEED8DD000-memory.dmp

            Filesize

            9.6MB

          • memory/18668-688-0x0000000002490000-0x0000000002510000-memory.dmp

            Filesize

            512KB

          • memory/18668-691-0x000007FEECF40000-0x000007FEED8DD000-memory.dmp

            Filesize

            9.6MB

          • memory/18668-693-0x0000000002490000-0x0000000002510000-memory.dmp

            Filesize

            512KB

          • memory/18668-686-0x000007FEECF40000-0x000007FEED8DD000-memory.dmp

            Filesize

            9.6MB

          • memory/18668-696-0x0000000002490000-0x0000000002510000-memory.dmp

            Filesize

            512KB

          • memory/18668-673-0x000000001B290000-0x000000001B572000-memory.dmp

            Filesize

            2.9MB

          • memory/18668-698-0x0000000002490000-0x0000000002510000-memory.dmp

            Filesize

            512KB

          • memory/18716-690-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-699-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-701-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/18716-702-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-704-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-694-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-707-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-687-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/18716-709-0x0000000074210000-0x00000000748FE000-memory.dmp

            Filesize

            6.9MB

          • memory/18716-710-0x00000000009F0000-0x0000000000A30000-memory.dmp

            Filesize

            256KB

          • memory/18716-713-0x0000000074210000-0x00000000748FE000-memory.dmp

            Filesize

            6.9MB

          • memory/18716-714-0x00000000009F0000-0x0000000000A30000-memory.dmp

            Filesize

            256KB