Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 15:13

General

  • Target

    beee421f170be70ca4efd8b81940e18b.exe

  • Size

    701KB

  • MD5

    beee421f170be70ca4efd8b81940e18b

  • SHA1

    a124ee2194c9970275f2454899a5025f2887d9ad

  • SHA256

    407a175b3d9735477868deec5907b8e9703abcd76799529d9e2354bdddde550b

  • SHA512

    24e06abbf300b6da57e9617da07a89a404696cc6f97213d2c503ce2c90d49cc8186e2c8dfc49b9fc6172a69675b00ab298a34617bc1ae821af0a3854fe315893

  • SSDEEP

    12288:384PU9vPU9Cv2pzKuAcOsBgo0q4wMLxogW1No7SEwWQK8U8URpje0n4UO856uxEh:38AAcOsBgo0q4wMbW1AwTG8Uj4Kkbrh4

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    PbQ)ubh9

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe
    "C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe
      "C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe"
      2⤵
        PID:3952
      • C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe
        "C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe"
        2⤵
          PID:2732
        • C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe
          "C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe"
          2⤵
            PID:3412
          • C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe
            "C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe"
            2⤵
              PID:3132
            • C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe
              "C:\Users\Admin\AppData\Local\Temp\beee421f170be70ca4efd8b81940e18b.exe"
              2⤵
              • Accesses Microsoft Outlook profiles
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • outlook_office_path
              • outlook_win_path
              PID:2828

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\beee421f170be70ca4efd8b81940e18b.exe.log

            Filesize

            1KB

            MD5

            84e77a587d94307c0ac1357eb4d3d46f

            SHA1

            83cc900f9401f43d181207d64c5adba7a85edc1e

            SHA256

            e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99

            SHA512

            aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691

          • memory/2408-10-0x0000000006340000-0x00000000063BE000-memory.dmp

            Filesize

            504KB

          • memory/2408-3-0x0000000004CA0000-0x0000000004D32000-memory.dmp

            Filesize

            584KB

          • memory/2408-11-0x00000000063C0000-0x0000000006402000-memory.dmp

            Filesize

            264KB

          • memory/2408-4-0x0000000004D40000-0x0000000004DDC000-memory.dmp

            Filesize

            624KB

          • memory/2408-5-0x0000000004F00000-0x0000000004F10000-memory.dmp

            Filesize

            64KB

          • memory/2408-6-0x0000000004C40000-0x0000000004C4A000-memory.dmp

            Filesize

            40KB

          • memory/2408-7-0x0000000004690000-0x00000000046A2000-memory.dmp

            Filesize

            72KB

          • memory/2408-8-0x0000000074ED0000-0x0000000075680000-memory.dmp

            Filesize

            7.7MB

          • memory/2408-0-0x0000000000170000-0x0000000000226000-memory.dmp

            Filesize

            728KB

          • memory/2408-1-0x0000000074ED0000-0x0000000075680000-memory.dmp

            Filesize

            7.7MB

          • memory/2408-15-0x0000000074ED0000-0x0000000075680000-memory.dmp

            Filesize

            7.7MB

          • memory/2408-2-0x00000000051B0000-0x0000000005754000-memory.dmp

            Filesize

            5.6MB

          • memory/2408-9-0x0000000004F00000-0x0000000004F10000-memory.dmp

            Filesize

            64KB

          • memory/2828-24-0x0000000005130000-0x0000000005140000-memory.dmp

            Filesize

            64KB

          • memory/2828-16-0x0000000074ED0000-0x0000000075680000-memory.dmp

            Filesize

            7.7MB

          • memory/2828-17-0x0000000005130000-0x0000000005140000-memory.dmp

            Filesize

            64KB

          • memory/2828-18-0x0000000005450000-0x0000000005468000-memory.dmp

            Filesize

            96KB

          • memory/2828-19-0x0000000005CF0000-0x0000000005D56000-memory.dmp

            Filesize

            408KB

          • memory/2828-21-0x0000000074ED0000-0x0000000075680000-memory.dmp

            Filesize

            7.7MB

          • memory/2828-22-0x0000000005130000-0x0000000005140000-memory.dmp

            Filesize

            64KB

          • memory/2828-23-0x0000000005F50000-0x0000000005FA0000-memory.dmp

            Filesize

            320KB

          • memory/2828-12-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB