Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 16:29

General

  • Target

    e-dekont_html.exe

  • Size

    610KB

  • MD5

    66e196c15ec46d1e7526b1c48da1b72a

  • SHA1

    f9b2dc950a21c296aaf57a013c3f4e93f8ebbad2

  • SHA256

    8c5c6b99a06119e1064bfcf3f53cc66150751c0969dc37dc3603eef5535a8af9

  • SHA512

    f8d8241d5af76033ba83caff888d325285110356b8e35175260a912cf416670465d218d7c550b9f15cc969bc2f53381cb8e41dd4f9a859cae65e4df600b6f851

  • SSDEEP

    12288:yRfHhxVzsP5wzyNwv5gs3MjeNPq0wKrCHrT3GQzRVPUYvV3L2dXEg:yXxU5wzaktc4PEWCHfGQzbPfvFydXEg

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe
    "C:\Users\Admin\AppData\Local\Temp\e-dekont_html.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2688
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2B06.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2600
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1236
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2408
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2444
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1236 -s 824
          4⤵
          • Loads dropped DLL
          PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp2B06.tmp.bat

    Filesize

    151B

    MD5

    c378f493d2bf2ea68f8ef7320429dbca

    SHA1

    24e10f23368a9f252f357a130732c84fea008919

    SHA256

    f76581c2c81711265dbb86944d09047454f9ba0b3a73abd821964a1dc341922e

    SHA512

    dfb6425bab1096b488fc71324f8a898178acde709bcb6c46021cbad28839e0acd52aaf4f7afdbdc0c850aebb91e7a19302875841ddd44bc26f5d14015c86dd23

  • \Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    610KB

    MD5

    66e196c15ec46d1e7526b1c48da1b72a

    SHA1

    f9b2dc950a21c296aaf57a013c3f4e93f8ebbad2

    SHA256

    8c5c6b99a06119e1064bfcf3f53cc66150751c0969dc37dc3603eef5535a8af9

    SHA512

    f8d8241d5af76033ba83caff888d325285110356b8e35175260a912cf416670465d218d7c550b9f15cc969bc2f53381cb8e41dd4f9a859cae65e4df600b6f851

  • memory/1236-20-0x000007FEF4AD0000-0x000007FEF54BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1236-57-0x000000001B370000-0x000000001B3F0000-memory.dmp

    Filesize

    512KB

  • memory/1236-56-0x000007FEF4AD0000-0x000007FEF54BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1236-22-0x000000001B370000-0x000000001B3F0000-memory.dmp

    Filesize

    512KB

  • memory/1236-21-0x000000001B370000-0x000000001B3F0000-memory.dmp

    Filesize

    512KB

  • memory/1236-19-0x0000000000A70000-0x0000000000A7C000-memory.dmp

    Filesize

    48KB

  • memory/2200-3-0x000000001B360000-0x000000001B3E0000-memory.dmp

    Filesize

    512KB

  • memory/2200-14-0x000007FEF54C0000-0x000007FEF5EAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-4-0x0000000000A60000-0x0000000000AF4000-memory.dmp

    Filesize

    592KB

  • memory/2200-0-0x0000000000BC0000-0x0000000000BCC000-memory.dmp

    Filesize

    48KB

  • memory/2200-2-0x000000001B360000-0x000000001B3E0000-memory.dmp

    Filesize

    512KB

  • memory/2200-1-0x000007FEF54C0000-0x000007FEF5EAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2408-33-0x000000001B690000-0x000000001B972000-memory.dmp

    Filesize

    2.9MB

  • memory/2408-47-0x0000000002D30000-0x0000000002DB0000-memory.dmp

    Filesize

    512KB

  • memory/2408-34-0x000007FEEE210000-0x000007FEEEBAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2408-42-0x0000000002D30000-0x0000000002DB0000-memory.dmp

    Filesize

    512KB

  • memory/2408-55-0x000007FEEE210000-0x000007FEEEBAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2408-38-0x000007FEEE210000-0x000007FEEEBAD000-memory.dmp

    Filesize

    9.6MB

  • memory/2408-37-0x0000000002D30000-0x0000000002DB0000-memory.dmp

    Filesize

    512KB

  • memory/2408-36-0x00000000027E0000-0x00000000027E8000-memory.dmp

    Filesize

    32KB

  • memory/2444-44-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-35-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-41-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-29-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-23-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-52-0x0000000073F00000-0x00000000745EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2444-46-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-54-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB

  • memory/2444-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2444-31-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2444-58-0x0000000073F00000-0x00000000745EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2444-59-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB