Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 06:34

General

  • Target

    tmjGCGOEGMinVPD.exe

  • Size

    691KB

  • MD5

    b5006f1dac678c6e6a2c698704e49ad4

  • SHA1

    2ad2b936da60e85c1dc26b6281ad8380393b0fcb

  • SHA256

    17ffcd130215ae5b3f8ba4f4aa5577abdf7c44a0c2e70619c35e42bafbbb3a82

  • SHA512

    cd21606434f044e533876f37f44579bd916d868ad6e0f4957a9991b29fd03d69773cbf6f1c232ba5dec41787bcd3c73c04b25a02bb5fdce6a01104e57bf4d4b7

  • SSDEEP

    12288:G/fWTAkMq3EAppRG1/D02YbItl1rr6NPcCCZ7VB2iGI881CEt2UXS+ucb:UmAAEQg3v6NPm7VEIlp2Ui+ucb

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmjGCGOEGMinVPD.exe
    "C:\Users\Admin\AppData\Local\Temp\tmjGCGOEGMinVPD.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\tmjGCGOEGMinVPD.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IeagOAdQiUHWi.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IeagOAdQiUHWi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B67.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2444

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp7B67.tmp

          Filesize

          1KB

          MD5

          f27ec93d7b880b9f2c04d772070f15b4

          SHA1

          63e3a97fa8a6103fc1771be9f44e59e323edbf0f

          SHA256

          ea4b0cd196e9cbd78d0365e9db527d249214e32ff656e94b68e8d47e5c638bd9

          SHA512

          f8f6a2fd4bbea8e7380a4a36f99bcd6fc2b37298ecee31ae3cab68ead8db13f66c98db9035464991a2f452ffb3fb35975bb715213c2f580955763bb484b8a25b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          51b5dbf791af4b0deb977e955fb77923

          SHA1

          4a3b14a6eab155ae13c6f1eeca72fc0fccd511cd

          SHA256

          b56dca6e81206dc09b2a647034dff3f2ff64ba1419d6acc7c49122743caed027

          SHA512

          23fa91db8eec1c36fc0639ea803b921bb459e4c30278d7a96f4c711211cd56272eddb4ff86c64c9126b748b31a8b1813cffaf709a4cea82e85d5a126721e611c

        • memory/2444-27-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2444-41-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2444-50-0x0000000004B50000-0x0000000004B90000-memory.dmp

          Filesize

          256KB

        • memory/2444-49-0x0000000074270000-0x000000007495E000-memory.dmp

          Filesize

          6.9MB

        • memory/2444-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2444-46-0x0000000004B50000-0x0000000004B90000-memory.dmp

          Filesize

          256KB

        • memory/2444-45-0x0000000074270000-0x000000007495E000-memory.dmp

          Filesize

          6.9MB

        • memory/2444-44-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2444-31-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2444-39-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2444-21-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2444-25-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2532-24-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2532-28-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2532-34-0x0000000002770000-0x00000000027B0000-memory.dmp

          Filesize

          256KB

        • memory/2532-38-0x0000000002770000-0x00000000027B0000-memory.dmp

          Filesize

          256KB

        • memory/2532-20-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2532-32-0x0000000002770000-0x00000000027B0000-memory.dmp

          Filesize

          256KB

        • memory/2532-48-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-36-0x0000000002810000-0x0000000002850000-memory.dmp

          Filesize

          256KB

        • memory/2628-30-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-22-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-47-0x000000006E0A0000-0x000000006E64B000-memory.dmp

          Filesize

          5.7MB

        • memory/2992-0-0x0000000000FD0000-0x0000000001082000-memory.dmp

          Filesize

          712KB

        • memory/2992-3-0x0000000000F20000-0x0000000000FBE000-memory.dmp

          Filesize

          632KB

        • memory/2992-1-0x00000000749E0000-0x00000000750CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2992-43-0x00000000749E0000-0x00000000750CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2992-2-0x0000000004AE0000-0x0000000004B20000-memory.dmp

          Filesize

          256KB

        • memory/2992-7-0x0000000004C20000-0x0000000004CA2000-memory.dmp

          Filesize

          520KB

        • memory/2992-6-0x0000000000B80000-0x0000000000B8C000-memory.dmp

          Filesize

          48KB

        • memory/2992-5-0x0000000000B70000-0x0000000000B78000-memory.dmp

          Filesize

          32KB

        • memory/2992-4-0x00000000003F0000-0x0000000000404000-memory.dmp

          Filesize

          80KB