Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 09:42

General

  • Target

    Statement.exe

  • Size

    707KB

  • MD5

    2c65739974d4ddc4346aa7d265a21378

  • SHA1

    39d7dee2e1304ada056a887371d2fd0f2f31fbc8

  • SHA256

    d94b9ee70ad9ab6ba6f81c0f01565681714c56297d8d5826135c80c6cbbb2146

  • SHA512

    f75dbecc97abd8405fc9177d4829e169967a179d96d09f379f704e28262ab288157dcb7472a7d75410531b12ca483a875abf9d9983ee96f6354352e309377a91

  • SSDEEP

    12288:s5h62ReY5anXzE6IEaXJNZWKsQmieRZSXakooX33G/st0LYxxH4kR:s5h6yajE6IZN4KDeRhkoRstGYxxP

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Statement.exe
    "C:\Users\Admin\AppData\Local\Temp\Statement.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Statement.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2012
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kHuYesbt.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2456
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kHuYesbt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC256.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4984
    • C:\Users\Admin\AppData\Local\Temp\Statement.exe
      "C:\Users\Admin\AppData\Local\Temp\Statement.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Statement.exe.log

          Filesize

          1KB

          MD5

          8ec831f3e3a3f77e4a7b9cd32b48384c

          SHA1

          d83f09fd87c5bd86e045873c231c14836e76a05c

          SHA256

          7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

          SHA512

          26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          0f2223531bc18038e43190258ec12a28

          SHA1

          0e197e17158b377715cc685332b15cfb23dc66bd

          SHA256

          f86f2b09b626f5e5d8364b58faa1c2071466e16d1701b5a6d34cd831d9df8585

          SHA512

          8a71175f8929cd870cb5bb1dc7d92c5168558558489b5732eea1c4fb11a60b6d71be7b4249c7fe19db0fd443e2b2b44d3576ec5bbf9091d8aab50f8cceea0622

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_d32riwtf.xnr.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\tmpC256.tmp

          Filesize

          1KB

          MD5

          a64cdd5cb1021a4fd8cb6c8f5b963ec9

          SHA1

          e06b44efef4dfb11a1ad95ba70b4737a56bb9827

          SHA256

          47068900aed4dd1afa26cb727c050a2b434a0ec4f47f3af2cb9705c4df0daa9f

          SHA512

          89ae1de7bf05489156efa5831207ad4ce853ba30fd37b3b9667142a6cdbd58fac5b45d5b714a3bfe54f13c0b752941415a5e89ccd76d7aaf00d0288b6c467a8e

        • memory/1840-49-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1840-3-0x0000000005770000-0x0000000005802000-memory.dmp

          Filesize

          584KB

        • memory/1840-7-0x0000000005A10000-0x0000000005A22000-memory.dmp

          Filesize

          72KB

        • memory/1840-8-0x0000000006A80000-0x0000000006A88000-memory.dmp

          Filesize

          32KB

        • memory/1840-9-0x0000000006A90000-0x0000000006A9C000-memory.dmp

          Filesize

          48KB

        • memory/1840-10-0x0000000006AF0000-0x0000000006B74000-memory.dmp

          Filesize

          528KB

        • memory/1840-11-0x00000000091B0000-0x000000000924C000-memory.dmp

          Filesize

          624KB

        • memory/1840-0-0x0000000000C80000-0x0000000000D32000-memory.dmp

          Filesize

          712KB

        • memory/1840-2-0x0000000005D20000-0x00000000062C4000-memory.dmp

          Filesize

          5.6MB

        • memory/1840-1-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/1840-6-0x00000000069D0000-0x0000000006A70000-memory.dmp

          Filesize

          640KB

        • memory/1840-4-0x0000000005950000-0x0000000005960000-memory.dmp

          Filesize

          64KB

        • memory/1840-5-0x0000000005730000-0x000000000573A000-memory.dmp

          Filesize

          40KB

        • memory/2012-86-0x0000000007E20000-0x0000000007E2E000-memory.dmp

          Filesize

          56KB

        • memory/2012-56-0x0000000007A80000-0x0000000007AB2000-memory.dmp

          Filesize

          200KB

        • memory/2012-96-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/2012-55-0x000000007FBF0000-0x000000007FC00000-memory.dmp

          Filesize

          64KB

        • memory/2012-80-0x0000000007BF0000-0x0000000007C0A000-memory.dmp

          Filesize

          104KB

        • memory/2012-28-0x0000000006150000-0x00000000061B6000-memory.dmp

          Filesize

          408KB

        • memory/2012-45-0x0000000006380000-0x00000000066D4000-memory.dmp

          Filesize

          3.3MB

        • memory/2012-69-0x0000000071190000-0x00000000711DC000-memory.dmp

          Filesize

          304KB

        • memory/2012-17-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/2012-79-0x0000000007AC0000-0x0000000007B63000-memory.dmp

          Filesize

          652KB

        • memory/2012-83-0x0000000007E70000-0x0000000007F06000-memory.dmp

          Filesize

          600KB

        • memory/2012-16-0x0000000002FE0000-0x0000000003016000-memory.dmp

          Filesize

          216KB

        • memory/2012-22-0x0000000002FD0000-0x0000000002FE0000-memory.dmp

          Filesize

          64KB

        • memory/2012-88-0x0000000007F30000-0x0000000007F4A000-memory.dmp

          Filesize

          104KB

        • memory/2012-87-0x0000000007E30000-0x0000000007E44000-memory.dmp

          Filesize

          80KB

        • memory/2020-50-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/2020-51-0x0000000005150000-0x0000000005160000-memory.dmp

          Filesize

          64KB

        • memory/2020-97-0x00000000069A0000-0x00000000069F0000-memory.dmp

          Filesize

          320KB

        • memory/2020-46-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2020-99-0x0000000005150000-0x0000000005160000-memory.dmp

          Filesize

          64KB

        • memory/2020-98-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/2456-18-0x00000000050D0000-0x00000000056F8000-memory.dmp

          Filesize

          6.2MB

        • memory/2456-68-0x0000000006630000-0x000000000664E000-memory.dmp

          Filesize

          120KB

        • memory/2456-81-0x00000000079D0000-0x000000000804A000-memory.dmp

          Filesize

          6.5MB

        • memory/2456-82-0x0000000007400000-0x000000000740A000-memory.dmp

          Filesize

          40KB

        • memory/2456-58-0x000000007F190000-0x000000007F1A0000-memory.dmp

          Filesize

          64KB

        • memory/2456-84-0x0000000007590000-0x00000000075A1000-memory.dmp

          Filesize

          68KB

        • memory/2456-57-0x0000000071190000-0x00000000711DC000-memory.dmp

          Filesize

          304KB

        • memory/2456-54-0x0000000002720000-0x0000000002730000-memory.dmp

          Filesize

          64KB

        • memory/2456-53-0x00000000065B0000-0x00000000065FC000-memory.dmp

          Filesize

          304KB

        • memory/2456-89-0x00000000076B0000-0x00000000076B8000-memory.dmp

          Filesize

          32KB

        • memory/2456-52-0x0000000006060000-0x000000000607E000-memory.dmp

          Filesize

          120KB

        • memory/2456-25-0x00000000058A0000-0x0000000005906000-memory.dmp

          Filesize

          408KB

        • memory/2456-95-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB

        • memory/2456-24-0x0000000005800000-0x0000000005822000-memory.dmp

          Filesize

          136KB

        • memory/2456-20-0x0000000002720000-0x0000000002730000-memory.dmp

          Filesize

          64KB

        • memory/2456-21-0x0000000002720000-0x0000000002730000-memory.dmp

          Filesize

          64KB

        • memory/2456-19-0x0000000074AF0000-0x00000000752A0000-memory.dmp

          Filesize

          7.7MB