Analysis

  • max time kernel
    162s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 02:08

General

  • Target

    Details And Invoices.exe

  • Size

    685KB

  • MD5

    19ab7a94788f74e80ccd992895853796

  • SHA1

    a39d701199164f300f8715e72630ffae0679f86f

  • SHA256

    88bdbcde8b2d570627dc08c006aa9636a69beb588c9a17e651ce783a7450f7f1

  • SHA512

    4f7e2a2a99f29f21b60f5208937dc19cc6f350152fd8147069840261161715fe7ec6637ced5fd7e4f8f60c0d87879f32f33fd45325db4544435afec9b2f9c59a

  • SSDEEP

    12288:3NCe3Ka5ATVEhjHskBmQwwLETQsAVudsBvAFuMricTsN:3NCVaG+jMkcQwBQl4dkvAOUsN

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 2 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Details And Invoices.exe
    "C:\Users\Admin\AppData\Local\Temp\Details And Invoices.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -windowstyle hidden "$Villys=Get-Content 'C:\Users\Admin\AppData\Local\Temp\clinginess\Calycanthemy92\unvitiated\Immatrikulerendes\Trogons.Thi';$Piniferous=$Villys.SubString(25882,3);.$Piniferous($Villys)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3780
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
        3⤵
          PID:2844
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lpgvejbp.5cp.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\clinginess\Calycanthemy92\unvitiated\Immatrikulerendes\Trogons.Thi

      Filesize

      53KB

      MD5

      5fd33bf891b22a73cefc7584dab237d7

      SHA1

      c6412a8f00de3c3bf551dc729aeaa95b29e06786

      SHA256

      f0a0b4b3cac5b00ba4d6c865ff4492e2aca2e7521e9da310866512e7ec06a8ad

      SHA512

      744b84aecc85f04f6203e40285bb716b6c24121ec0b2266ee938ddaa195e46d4fb710541f78fe79738e68faff7beb097505c3867f4eea5f90e3e873f2480d110

    • C:\Users\Admin\AppData\Local\Temp\clinginess\Calycanthemy92\unvitiated\Relativpronomens\Sportspc\Defektes\Encist\Ethologically.Reh

      Filesize

      308KB

      MD5

      b01e631f8c811b42b4591226c7d0b090

      SHA1

      4cf771606b7437d16ac5d8e649b7c379c9bfb9e0

      SHA256

      4d94c050d89bab0d92d66c3f70e2aa3dc6732d2c87daa57d60694d1f8f8e8243

      SHA512

      ac1045c977d2d001af655a2956f57a1780f7310d13c5ab6d1d1898cd31e3cd6ad2f8c27c0e1e01497e9b97c504e7bfd50e971d4fb4fbdd957e7dce84c6217c10

    • C:\Windows\Resources\Mydatoxine.lnk

      Filesize

      1KB

      MD5

      aa55740cef38213406ca4795c1f049a6

      SHA1

      fa40155a18093d0cca1bfed220d82f36380d6491

      SHA256

      a75deb1937acf32299ee8f6700e1db589e1bb08c2eb3606c4e080c7637ee25c7

      SHA512

      58473a13dc2f61af893e58e8756ab0680f4097e808c58e63a3f49dea4aadf40e7e280d6392ba9554c64d509e249a5b4a17d16d985e508a62cb6c6f818de4e0e3

    • memory/3028-175-0x0000000073D30000-0x00000000744E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3028-172-0x0000000077781000-0x00000000778A1000-memory.dmp

      Filesize

      1.1MB

    • memory/3028-171-0x0000000000F00000-0x0000000002154000-memory.dmp

      Filesize

      18.3MB

    • memory/3028-167-0x0000000000F00000-0x0000000002154000-memory.dmp

      Filesize

      18.3MB

    • memory/3028-166-0x0000000077781000-0x00000000778A1000-memory.dmp

      Filesize

      1.1MB

    • memory/3028-174-0x0000000000F00000-0x0000000000F44000-memory.dmp

      Filesize

      272KB

    • memory/3028-165-0x0000000077808000-0x0000000077809000-memory.dmp

      Filesize

      4KB

    • memory/3028-177-0x0000000002160000-0x00000000034E3000-memory.dmp

      Filesize

      19.5MB

    • memory/3028-164-0x0000000002160000-0x00000000034E3000-memory.dmp

      Filesize

      19.5MB

    • memory/3028-178-0x0000000021650000-0x0000000021660000-memory.dmp

      Filesize

      64KB

    • memory/3780-141-0x00000000069A0000-0x00000000069BE000-memory.dmp

      Filesize

      120KB

    • memory/3780-161-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-146-0x0000000006F60000-0x0000000006F82000-memory.dmp

      Filesize

      136KB

    • memory/3780-147-0x00000000081C0000-0x0000000008764000-memory.dmp

      Filesize

      5.6MB

    • memory/3780-144-0x0000000007B70000-0x0000000007C06000-memory.dmp

      Filesize

      600KB

    • memory/3780-149-0x0000000008DF0000-0x000000000946A000-memory.dmp

      Filesize

      6.5MB

    • memory/3780-150-0x0000000073D30000-0x00000000744E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3780-151-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-152-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-154-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-143-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-157-0x0000000007E30000-0x0000000007E34000-memory.dmp

      Filesize

      16KB

    • memory/3780-158-0x0000000009470000-0x000000000A7F3000-memory.dmp

      Filesize

      19.5MB

    • memory/3780-159-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-160-0x0000000009470000-0x000000000A7F3000-memory.dmp

      Filesize

      19.5MB

    • memory/3780-145-0x0000000006ED0000-0x0000000006EEA000-memory.dmp

      Filesize

      104KB

    • memory/3780-162-0x0000000009470000-0x000000000A7F3000-memory.dmp

      Filesize

      19.5MB

    • memory/3780-163-0x0000000077781000-0x00000000778A1000-memory.dmp

      Filesize

      1.1MB

    • memory/3780-142-0x00000000069F0000-0x0000000006A3C000-memory.dmp

      Filesize

      304KB

    • memory/3780-140-0x00000000063F0000-0x0000000006744000-memory.dmp

      Filesize

      3.3MB

    • memory/3780-130-0x0000000005BE0000-0x0000000005C46000-memory.dmp

      Filesize

      408KB

    • memory/3780-129-0x0000000005B70000-0x0000000005BD6000-memory.dmp

      Filesize

      408KB

    • memory/3780-128-0x00000000059D0000-0x00000000059F2000-memory.dmp

      Filesize

      136KB

    • memory/3780-127-0x0000000005CC0000-0x00000000062E8000-memory.dmp

      Filesize

      6.2MB

    • memory/3780-173-0x0000000073D30000-0x00000000744E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3780-126-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-125-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/3780-176-0x0000000009470000-0x000000000A7F3000-memory.dmp

      Filesize

      19.5MB

    • memory/3780-124-0x0000000073D30000-0x00000000744E0000-memory.dmp

      Filesize

      7.7MB

    • memory/3780-123-0x0000000003050000-0x0000000003086000-memory.dmp

      Filesize

      216KB