Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 01:07

General

  • Target

    c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe

  • Size

    697KB

  • MD5

    ac26d2cbb10147452d05954370444a1b

  • SHA1

    64257dbb911889303be1ed73518fa9525e068428

  • SHA256

    c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c

  • SHA512

    043d49cfe502e5f930d5c6c1b43d2cf07ac1fa97044077373f1cafcbf8623c2cc5fa1a99a022fa00ebefb7bd734cdf38265ac29804e328ef8c797c1318562899

  • SSDEEP

    12288:1+DbgvUB778Qeexx1rNUCDVCLU5uf2tkJCwON8/aUHOYtFsBnTadozPP3JCrhd:UgsBZj9NUHbRJMNfUlkTaSzPP0hd

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe
    "C:\Users\Admin\AppData\Local\Temp\c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2508
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\fxTrTFmtJU.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2556
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fxTrTFmtJU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4579.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2648
    • C:\Users\Admin\AppData\Local\Temp\c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe
      "C:\Users\Admin\AppData\Local\Temp\c7174f7a64121e448a1789b703c2e263b1f9db4bc52aa3aeceded1879905af6c.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2404

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp4579.tmp
    Filesize

    1KB

    MD5

    351b9337191affd89f3d2132dcc6c8d2

    SHA1

    5cdbfd416706640ac8876f4c0f19324bd13d61b4

    SHA256

    40aaf8f534f669444c76555fd7f80636604954c8b7842fe7ddd1f8bdffad3d09

    SHA512

    5ba0e780ac2d4eb975b41bb2b26e9ade9c5786a1703608e61604ad296bc4ef100df03162bba8d47ea7716b6471fb5864d75ed87c4ac2fd14d6f71dec3c45d5ef

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UPQ3DEXYGICV44W5UU89.temp
    Filesize

    7KB

    MD5

    a25acdfa4643831d9aaf17ad422a4e3f

    SHA1

    d8fd4f6d7cf4203fda0774c8059a3eb88123b167

    SHA256

    830c37b3f6afc110fa25f3bd1a4c03f209b23e63c50495b79127b80b70957804

    SHA512

    a70d9666729d813001537e8923e3253f9d7eaf38c8cca15934c6e030a33e5a117866da0e3479dd6926afc3cd6aad997ced73d81af4bd306f51764abdd6e6f8af

  • memory/1972-4-0x00000000004D0000-0x00000000004DE000-memory.dmp
    Filesize

    56KB

  • memory/1972-31-0x0000000074960000-0x000000007504E000-memory.dmp
    Filesize

    6.9MB

  • memory/1972-0-0x00000000011D0000-0x0000000001284000-memory.dmp
    Filesize

    720KB

  • memory/1972-5-0x00000000004E0000-0x00000000004F6000-memory.dmp
    Filesize

    88KB

  • memory/1972-6-0x0000000000C30000-0x0000000000CB4000-memory.dmp
    Filesize

    528KB

  • memory/1972-2-0x0000000004F40000-0x0000000004F80000-memory.dmp
    Filesize

    256KB

  • memory/1972-1-0x0000000074960000-0x000000007504E000-memory.dmp
    Filesize

    6.9MB

  • memory/1972-3-0x00000000004A0000-0x00000000004B8000-memory.dmp
    Filesize

    96KB

  • memory/2404-19-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2404-30-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2404-29-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2404-28-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2404-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
    Filesize

    4KB

  • memory/2404-23-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2404-22-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB

  • memory/2404-25-0x0000000000400000-0x0000000000442000-memory.dmp
    Filesize

    264KB