Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 02:00

General

  • Target

    d920f54205824893b67562d371ea565dc2ae8f1dc02b6e2e079ff0ec246563e6.exe

  • Size

    66KB

  • MD5

    40d4f9dce0a4c36281ac0fd748623f22

  • SHA1

    b4ac62a557b720a82a89f279aebf062247ed686b

  • SHA256

    d920f54205824893b67562d371ea565dc2ae8f1dc02b6e2e079ff0ec246563e6

  • SHA512

    3bbe8979e950d3d4810b762f18496d91f3a867300d65e638d268030255f1f805f7479a44903f29d7382390a0462872f9af259b8ff5177552f143c8dc20b80705

  • SSDEEP

    1536:uclZk2SFjwIcry68JT3KDJipMJQ2v83hGH:uclCw83JzK9kMJQ2vZH

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 2 IoCs
  • Detect packed .NET executables. Mostly AgentTeslaV4. 1 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables packed with SmartAssembly 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d920f54205824893b67562d371ea565dc2ae8f1dc02b6e2e079ff0ec246563e6.exe
    "C:\Users\Admin\AppData\Local\Temp\d920f54205824893b67562d371ea565dc2ae8f1dc02b6e2e079ff0ec246563e6.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Users\Admin\AppData\Local\Temp\Mrmjzj.exe
      "C:\Users\Admin\AppData\Local\Temp\Mrmjzj.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        PID:4296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Mrmjzj.exe

    Filesize

    93KB

    MD5

    93e85d15ef93ddf8ac964f84d9bec664

    SHA1

    e3d58cca51afd2449a11a8a18c5a0f871dbca59c

    SHA256

    816bb9cdaa18ffba5dbcedf69298718caac8a4ff6c674300a9299d0584a236c9

    SHA512

    acd703192f69af97cd6d288ad43b3b6dc6e711c7747f25af05a0f0fe3619b5c503857d0f6dbe93b4d5dd411b8f0a51cf25b8596396c756cf7f3faed57b00c49c

  • memory/1124-4910-0x0000000004E20000-0x0000000004E86000-memory.dmp

    Filesize

    408KB

  • memory/1124-10657-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/1124-4908-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/1124-5755-0x00000000062F0000-0x00000000062FA000-memory.dmp

    Filesize

    40KB

  • memory/1124-5688-0x0000000006280000-0x00000000062D0000-memory.dmp

    Filesize

    320KB

  • memory/1124-4909-0x0000000000800000-0x0000000000840000-memory.dmp

    Filesize

    256KB

  • memory/1124-4911-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3476-9795-0x0000000005990000-0x0000000005A92000-memory.dmp

    Filesize

    1.0MB

  • memory/3476-4912-0x0000000005AD0000-0x0000000005D96000-memory.dmp

    Filesize

    2.8MB

  • memory/3476-9801-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3476-4906-0x00000000008C0000-0x00000000008C6000-memory.dmp

    Filesize

    24KB

  • memory/3476-4903-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/3476-4900-0x00000000000D0000-0x00000000000EA000-memory.dmp

    Filesize

    104KB

  • memory/4088-27-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-67-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-17-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-13-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-11-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-7-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-6-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-59-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-65-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-63-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-61-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-57-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-55-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-53-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-51-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-49-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-47-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-45-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-43-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-41-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-39-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-37-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-35-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-0-0x0000000074F0E000-0x0000000074F0F000-memory.dmp

    Filesize

    4KB

  • memory/4088-69-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-4886-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4088-4888-0x0000000005B60000-0x0000000005BAC000-memory.dmp

    Filesize

    304KB

  • memory/4088-4887-0x0000000005AB0000-0x0000000005B28000-memory.dmp

    Filesize

    480KB

  • memory/4088-19-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-33-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-4901-0x0000000005E90000-0x0000000005EE4000-memory.dmp

    Filesize

    336KB

  • memory/4088-23-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-25-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-4907-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4088-29-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-31-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-21-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-15-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-9-0x0000000007350000-0x0000000007586000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-5-0x0000000007630000-0x00000000076C2000-memory.dmp

    Filesize

    584KB

  • memory/4088-4-0x0000000007B40000-0x00000000080E4000-memory.dmp

    Filesize

    5.6MB

  • memory/4088-3-0x0000000007350000-0x000000000758C000-memory.dmp

    Filesize

    2.2MB

  • memory/4088-2-0x0000000074F00000-0x00000000756B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4088-1-0x0000000000750000-0x0000000000762000-memory.dmp

    Filesize

    72KB

  • memory/4296-9802-0x0000000004C30000-0x0000000004CF6000-memory.dmp

    Filesize

    792KB

  • memory/4296-10655-0x00000000050A0000-0x00000000050A8000-memory.dmp

    Filesize

    32KB

  • memory/4296-10656-0x00000000050B0000-0x0000000005106000-memory.dmp

    Filesize

    344KB

  • memory/4296-9800-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB