Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 01:37

General

  • Target

    ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef.exe

  • Size

    886KB

  • MD5

    fbe17d83775de641ffc9d2708c384d16

  • SHA1

    e08527df91745f9038afac249d924bb741b9a180

  • SHA256

    ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef

  • SHA512

    ca78e8ee5c23df2489ce50f8477775c27e29081282d1426f5cfe2815635a899d59dc14f6829ba4a357d4e9996711fdbfd945f0b35d94a55d983674ab220ae5ff

  • SSDEEP

    12288:0/Sr+pAQ3inVFasF1Bli8ax8BId9OZYo49+p4MUKlr5JGms4IQbxL8X:/+AQ32HB1taO49OYWbJ5JGmMQbxgX

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.wasstech.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Sunray2700@@

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef.exe
    "C:\Users\Admin\AppData\Local\Temp\ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EknnAUXeNs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2632
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EknnAUXeNs" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9DB6.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2584
    • C:\Users\Admin\AppData\Local\Temp\ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef.exe
      "C:\Users\Admin\AppData\Local\Temp\ef9350020f1b02c3d60b2cd2d7c371b00a8b3f6465e236fd4f1291ad52c31aef.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp9DB6.tmp

    Filesize

    1KB

    MD5

    e933de2349dab3d963273d646cb20da4

    SHA1

    2f1b881bbd9fcdd2fe6c6b24604b378a044239f5

    SHA256

    2ada42f8c7d6c5537575f3b0d4fea0a4c14d0429689e81c63801918e0efb32c2

    SHA512

    494b55feb9bde0b5b341d0bcc219217db5210d9fdd3273cb95f9702d56c7f3c633b2f5058e31c796a3bd51321dd2bfe323364fab9fb746712fe0e8fa68f9bb5f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    a0676a358d9eba9a10534d135b10efea

    SHA1

    b45d863ba56f9f304c6638258e9b29ea07c19c5a

    SHA256

    446eb6092b572004829f48a4473c8ce8ab532c570ec2baef7a22f02edc08c795

    SHA512

    fb8731f78a3f9bdf7486a8dd1f79c31e1395c17859c5952ae07eb660fb7f1c62b1be6e5c608a50e3bc7996019446f390f94c69340394319fc74df34d5a336876

  • memory/2404-31-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2404-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2404-47-0x0000000074C00000-0x00000000752EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2404-46-0x0000000004810000-0x0000000004850000-memory.dmp

    Filesize

    256KB

  • memory/2404-41-0x0000000074C00000-0x00000000752EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2404-29-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2404-27-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2404-19-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2404-20-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2404-21-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2404-23-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2632-37-0x000000006FA90000-0x000000007003B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-43-0x000000006FA90000-0x000000007003B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-42-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2632-39-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2632-34-0x000000006FA90000-0x000000007003B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-35-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2680-33-0x000000006FA90000-0x000000007003B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-44-0x000000006FA90000-0x000000007003B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-36-0x000000006FA90000-0x000000007003B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-40-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB

  • memory/2680-38-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB

  • memory/3012-32-0x0000000074C00000-0x00000000752EE000-memory.dmp

    Filesize

    6.9MB

  • memory/3012-1-0x0000000074C00000-0x00000000752EE000-memory.dmp

    Filesize

    6.9MB

  • memory/3012-6-0x00000000050B0000-0x0000000005136000-memory.dmp

    Filesize

    536KB

  • memory/3012-0-0x00000000012E0000-0x00000000013C4000-memory.dmp

    Filesize

    912KB

  • memory/3012-3-0x0000000000480000-0x000000000049C000-memory.dmp

    Filesize

    112KB

  • memory/3012-2-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB

  • memory/3012-5-0x0000000000800000-0x000000000080E000-memory.dmp

    Filesize

    56KB

  • memory/3012-4-0x0000000000520000-0x000000000052C000-memory.dmp

    Filesize

    48KB