Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 02:20

General

  • Target

    ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe

  • Size

    630KB

  • MD5

    37b2fbd574dab3275382f7a44b9c8c01

  • SHA1

    ba6217f025088a6391227c4d7790aee2ef7f94a4

  • SHA256

    ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901

  • SHA512

    e2111550a895009f7a4e9d76554873d649ab8da05f95da87887916857c23b23e3e5ae9c2085164bf09b52d3016cfa2b0dacd7798ac27dbe591cbb03ec39cce45

  • SSDEEP

    12288:YWYIPXjxannnHg2LK08imMWNtAgE8sjskQjUGpvzKazNbwk+l81fNwHh7k:YWYIPFannnHg22ZizWNqgE6LAav2cB+Q

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe
    "C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2548
    • C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe
      "C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe"
      2⤵
        PID:5016
      • C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe
        "C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe"
        2⤵
          PID:4340
        • C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe
          "C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe"
          2⤵
            PID:332
          • C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe
            "C:\Users\Admin\AppData\Local\Temp\ca29141c602052dd2caba38964ad54ad1e4540c803bdd13b75f8116531131901.exe"
            2⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2592

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_snfqlolr.kqt.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/1316-13-0x0000000074E90000-0x0000000075640000-memory.dmp

          Filesize

          7.7MB

        • memory/1316-1-0x0000000074E90000-0x0000000075640000-memory.dmp

          Filesize

          7.7MB

        • memory/1316-3-0x0000000004D60000-0x0000000004DF2000-memory.dmp

          Filesize

          584KB

        • memory/1316-4-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

          Filesize

          64KB

        • memory/1316-5-0x0000000004D40000-0x0000000004D4A000-memory.dmp

          Filesize

          40KB

        • memory/1316-6-0x0000000005380000-0x00000000053A0000-memory.dmp

          Filesize

          128KB

        • memory/1316-7-0x00000000053B0000-0x00000000053C4000-memory.dmp

          Filesize

          80KB

        • memory/1316-8-0x0000000008B70000-0x0000000008BE0000-memory.dmp

          Filesize

          448KB

        • memory/1316-9-0x000000000ABF0000-0x000000000AC8C000-memory.dmp

          Filesize

          624KB

        • memory/1316-2-0x00000000053C0000-0x0000000005964000-memory.dmp

          Filesize

          5.6MB

        • memory/1316-0-0x00000000002B0000-0x0000000000352000-memory.dmp

          Filesize

          648KB

        • memory/2548-18-0x00000000054F0000-0x0000000005B18000-memory.dmp

          Filesize

          6.2MB

        • memory/2548-43-0x0000000002A80000-0x0000000002A90000-memory.dmp

          Filesize

          64KB

        • memory/2548-14-0x0000000002AD0000-0x0000000002B06000-memory.dmp

          Filesize

          216KB

        • memory/2548-64-0x0000000074E90000-0x0000000075640000-memory.dmp

          Filesize

          7.7MB

        • memory/2548-33-0x00000000063C0000-0x00000000063DE000-memory.dmp

          Filesize

          120KB

        • memory/2548-17-0x0000000002A80000-0x0000000002A90000-memory.dmp

          Filesize

          64KB

        • memory/2548-19-0x0000000002A80000-0x0000000002A90000-memory.dmp

          Filesize

          64KB

        • memory/2548-61-0x0000000007A10000-0x0000000007A18000-memory.dmp

          Filesize

          32KB

        • memory/2548-21-0x0000000005B50000-0x0000000005B72000-memory.dmp

          Filesize

          136KB

        • memory/2548-22-0x0000000005CF0000-0x0000000005D56000-memory.dmp

          Filesize

          408KB

        • memory/2548-60-0x0000000007A30000-0x0000000007A4A000-memory.dmp

          Filesize

          104KB

        • memory/2548-59-0x0000000007930000-0x0000000007944000-memory.dmp

          Filesize

          80KB

        • memory/2548-32-0x0000000005DD0000-0x0000000006124000-memory.dmp

          Filesize

          3.3MB

        • memory/2548-57-0x0000000007920000-0x000000000792E000-memory.dmp

          Filesize

          56KB

        • memory/2548-35-0x000000007F300000-0x000000007F310000-memory.dmp

          Filesize

          64KB

        • memory/2548-36-0x0000000006990000-0x00000000069C2000-memory.dmp

          Filesize

          200KB

        • memory/2548-37-0x0000000070B10000-0x0000000070B5C000-memory.dmp

          Filesize

          304KB

        • memory/2548-15-0x0000000074E90000-0x0000000075640000-memory.dmp

          Filesize

          7.7MB

        • memory/2548-49-0x00000000069D0000-0x00000000069EE000-memory.dmp

          Filesize

          120KB

        • memory/2548-48-0x0000000002A80000-0x0000000002A90000-memory.dmp

          Filesize

          64KB

        • memory/2548-50-0x00000000073E0000-0x0000000007483000-memory.dmp

          Filesize

          652KB

        • memory/2548-51-0x0000000007D30000-0x00000000083AA000-memory.dmp

          Filesize

          6.5MB

        • memory/2548-52-0x00000000076F0000-0x000000000770A000-memory.dmp

          Filesize

          104KB

        • memory/2548-53-0x0000000007760000-0x000000000776A000-memory.dmp

          Filesize

          40KB

        • memory/2548-54-0x0000000007970000-0x0000000007A06000-memory.dmp

          Filesize

          600KB

        • memory/2548-55-0x00000000078F0000-0x0000000007901000-memory.dmp

          Filesize

          68KB

        • memory/2548-34-0x0000000006410000-0x000000000645C000-memory.dmp

          Filesize

          304KB

        • memory/2592-56-0x00000000063F0000-0x0000000006440000-memory.dmp

          Filesize

          320KB

        • memory/2592-58-0x0000000006610000-0x00000000067D2000-memory.dmp

          Filesize

          1.8MB

        • memory/2592-10-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2592-12-0x0000000074E90000-0x0000000075640000-memory.dmp

          Filesize

          7.7MB

        • memory/2592-20-0x0000000005020000-0x0000000005030000-memory.dmp

          Filesize

          64KB

        • memory/2592-16-0x0000000004F20000-0x0000000004F86000-memory.dmp

          Filesize

          408KB

        • memory/2592-65-0x0000000074E90000-0x0000000075640000-memory.dmp

          Filesize

          7.7MB

        • memory/2592-66-0x0000000005020000-0x0000000005030000-memory.dmp

          Filesize

          64KB