Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
MSK203.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MSK203.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
MSK203.exe
-
Size
495KB
-
MD5
672127d627b0d1ffdc8f4f6a7f6a4697
-
SHA1
965c08f135e270201ca61122955104c0de39ad9f
-
SHA256
c26d121b096af68fc785a4e7fbd821c0c63a64abd2a64c9abf237fe98d0ddf42
-
SHA512
f3e6c7837c767944d7e14cac75e5844fa217cfdc3d6dcae575a7d0ad2740617cce9e53e6b28f947114708361570972150737c9c1e3663b5b3ee9fd55a2d6a746
-
SSDEEP
12288:Pbm37Owct5ERd1ZRad1I5eA2bZxeyCNNrmj:Pbms5EP1CAsZxse
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6859247669:AAER1Rty_3TqZr1VmGGzXWMbtAZFtnPCWCU/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 2 IoCs
Processes:
MSK203.exepid process 3952 MSK203.exe 3952 MSK203.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 api.ipify.org 35 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
MSK203.exepid process 4336 MSK203.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
MSK203.exeMSK203.exepid process 3952 MSK203.exe 4336 MSK203.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MSK203.exedescription pid process target process PID 3952 set thread context of 4336 3952 MSK203.exe MSK203.exe -
Drops file in Windows directory 1 IoCs
Processes:
MSK203.exedescription ioc process File opened for modification C:\Windows\Fonts\Apoplektikerens\Chateaubriand.Exi MSK203.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSK203.exepid process 4336 MSK203.exe 4336 MSK203.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
MSK203.exepid process 3952 MSK203.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSK203.exedescription pid process Token: SeDebugPrivilege 4336 MSK203.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSK203.exedescription pid process target process PID 3952 wrote to memory of 4336 3952 MSK203.exe MSK203.exe PID 3952 wrote to memory of 4336 3952 MSK203.exe MSK203.exe PID 3952 wrote to memory of 4336 3952 MSK203.exe MSK203.exe PID 3952 wrote to memory of 4336 3952 MSK203.exe MSK203.exe PID 3952 wrote to memory of 4336 3952 MSK203.exe MSK203.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSK203.exe"C:\Users\Admin\AppData\Local\Temp\MSK203.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\MSK203.exe"C:\Users\Admin\AppData\Local\Temp\MSK203.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsc3368.tmpFilesize
25B
MD5cc98cdbdb6e4571f9dbef3d7ef0cecb6
SHA10c6c945dacb7dc9269bb8659e61b6bd44e03b5f4
SHA256fdd17f70c2c855ed3b81bf41d2dbff3a0d85a7f7b019f04c569f897188e0d3b3
SHA51283a41e73d62f77faf633e3fc5fb4f0ee4984881dc7ed5bbfcd73be815c89a606349cb0adf5de1552cfd0ca0ff3d7bd9c2332658586e582158e53777e2fcfba4c
-
C:\Users\Admin\AppData\Local\Temp\nsc3368.tmpFilesize
40B
MD57555d8867576c283634598e663953f15
SHA1d148b48ee18f2fd44ad664204c87654a147b1437
SHA2567135275acb09accf3ebc4449f7d0beb1bd2e4c3cd7e6cb20ac6c5a27927f0e0d
SHA5123dcdb430401f1a1e83db7c96047bceb11bb4b9c007a699e23d27f459a5e516c5dc6ad8c846e98a158ec461115f5c5175279d872d4dc908c79619e7f30004980e
-
C:\Users\Admin\AppData\Local\Temp\nsc3368.tmpFilesize
41B
MD501aeb309a102457b7557b79d712fc8dc
SHA197843bf5232d55e84c9d9680870ce3833855794d
SHA2564ae01a0ce57ab403950de39994cbbe27c1079182dd79ad464ebda843cfc9a22e
SHA51287bcceb5ebbd9b701f3600eeecef7fc21f878b23eed7c0147e201f09b0c485e51c5a5326c371083fa4b95602fc9682ad129f5962a7b27c13d86501c0569852e4
-
C:\Users\Admin\AppData\Local\Temp\nsc3368.tmpFilesize
37B
MD533aa92debcc1f60e7c5854cc89fab1fa
SHA1dfdb911fe590e83d018b61eb13c3d804a0e61a79
SHA25611ed97cbf6f46b9d72582a923af9ce569b7546fcc9357e317566d0b4bf0bedd1
SHA51224c749d4f77a21d79ef28986b5e906d51b2288c5c42216a3f74a484f8949cc26f1e221a8e29e358c3783f28215bde6dd196f228089b38ea72f179ef52c0f2845
-
C:\Users\Admin\AppData\Local\Temp\nsc3368.tmpFilesize
42B
MD5abaf5afae49de231f371269a34069e0f
SHA172bc1aa61539a5f5693f2f058508010b9ef5ba80
SHA2564d162c7221cd8f79fcd74428283af6fffdb4e5d50b1bf352483b1dac5e866204
SHA512f36d7195d3b93ee7ce3e986c35182a86a48b74b5ce504c268ab21662a5c05ba270836a0cd3ad78b42f24e5483323f84bb8528dfa3291715cc2c73de7397bb091
-
C:\Users\Admin\AppData\Local\Temp\nsc3368.tmpFilesize
60B
MD56905490802a6c440fab7bc3299682016
SHA17212e3db4f3387c8ff2daee9a94067db11a218be
SHA2560fc3d8084bd0470747f5e0ecb10127bbf64b1b7618ab5a819db38e4b839d3451
SHA512fcf7b1927605f76bd61d0f5c467b040f210d37ae99477f1a1984cc84037c2b7b461c668e1ba993dcb4e9393c2c7a16ac2b42ba2e97d4e18121ba18d800a04a1d
-
C:\Users\Admin\AppData\Local\Temp\nsc3454.tmpFilesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
C:\Users\Admin\AppData\Local\Temp\nsh3338.tmpFilesize
48B
MD5040cc34b899dd5230d5113b5156ec5d4
SHA160a49c8b3e3f33b38c1780e8826e50d9672c5bcf
SHA256454a97bbcd88c00fd8617e38fec2ebc855a608adbb751ad5ce4355f6bd171c32
SHA512e6d441445f20c73e6e23203323dd5ff68ac2a74767fa69aac7c2c1b05e7bd981cf461b66c9d516dc53b4bbc32117c12e103187cfca891846b9d42ee2aa2c423d
-
C:\Users\Admin\AppData\Local\Temp\nsh3338.tmpFilesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
C:\Users\Admin\AppData\Local\Temp\nsh3388.tmpFilesize
22B
MD57b892b8ac25286dbfdf8fc8817a3e958
SHA1240e4a574136f73209bdcc9010d20ce1be4ff364
SHA256dbb3bd7c79c96328be8974b16eaa4cdd93c9bd923c968a36d45474b9f1f93cff
SHA512a0d65c29e0256655382aa18fcd192b357c02d4c2b7047377e7fc45815c8b3961fbcb90c334a32255a53574751679f0030602147efa43d02633ce09e7b3e8f038
-
C:\Users\Admin\AppData\Local\Temp\nsh3388.tmpFilesize
24B
MD5942a0add5de9c46c9874a72eba3ce9f6
SHA1c51748200f0e8ff506ca5d9878573146be220491
SHA2563d42f06595afec189d9167ecf58d0da6c8294c155e9fc364d8fe8bdcdf25bc89
SHA5121813eba450ea8bb385b0da7ce4b54a196df7d8b8fb8e79ee9a8161aad31ba7e9e082a337e08c5f09aa19d48a19c1d3c20596893017f350dec28bab36b1366800
-
C:\Users\Admin\AppData\Local\Temp\nsh3388.tmpFilesize
40B
MD5b8a4108f6ce58d3dbef6bae0f8ee0308
SHA1797ff9be6fbf70ce8b083b79c0124ae39dad4268
SHA256a64dc40d4f6ea80dbf4e252aa2929a9d79dc43c0a0582d8befa46052c9993ab9
SHA51298c1d283ad88f296266c598674707b78eed4cb9344e18b87c8abe243fa588ca7fa2e16ebd675db24cc0d06f07fc10037a81d660a39cab170419995b9b7945c88
-
C:\Users\Admin\AppData\Local\Temp\nsh3388.tmpFilesize
56B
MD52c77bbd52333e4144ba070082eac42d6
SHA1d5570ca72f198bd75e1f0d241f0dd69986877ea4
SHA25654695e5022b16a8b57b4995eabb2d2b2212e0f3fc6ddad15cb2bbc5798fa3c04
SHA512c800b128aee9e19cfa614be129deed3a440263ff5b58d801e4929ceebf5a930eba8efe948c70e163294a4dabe993a6dcc24f3ca3cef859877da852919dce4162
-
C:\Users\Admin\AppData\Local\Temp\nss3328.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nsx32F8.tmpFilesize
74B
MD516d513397f3c1f8334e8f3e4fc49828f
SHA14ee15afca81ca6a13af4e38240099b730d6931f0
SHA256d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36
SHA5124a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3
-
memory/3952-576-0x0000000074BB5000-0x0000000074BB6000-memory.dmpFilesize
4KB
-
memory/3952-575-0x0000000077D51000-0x0000000077E71000-memory.dmpFilesize
1.1MB
-
memory/4336-585-0x00000000387A0000-0x0000000038806000-memory.dmpFilesize
408KB
-
memory/4336-586-0x0000000072600000-0x0000000072DB0000-memory.dmpFilesize
7.7MB
-
memory/4336-579-0x0000000000470000-0x00000000016C4000-memory.dmpFilesize
18.3MB
-
memory/4336-581-0x0000000077D51000-0x0000000077E71000-memory.dmpFilesize
1.1MB
-
memory/4336-582-0x000000007260E000-0x000000007260F000-memory.dmpFilesize
4KB
-
memory/4336-583-0x0000000000470000-0x00000000004B4000-memory.dmpFilesize
272KB
-
memory/4336-578-0x0000000077DF5000-0x0000000077DF6000-memory.dmpFilesize
4KB
-
memory/4336-577-0x0000000077DD8000-0x0000000077DD9000-memory.dmpFilesize
4KB
-
memory/4336-584-0x00000000380F0000-0x0000000038694000-memory.dmpFilesize
5.6MB
-
memory/4336-587-0x00000000390F0000-0x0000000039140000-memory.dmpFilesize
320KB
-
memory/4336-588-0x0000000039150000-0x00000000391EC000-memory.dmpFilesize
624KB
-
memory/4336-589-0x00000000391F0000-0x0000000039282000-memory.dmpFilesize
584KB
-
memory/4336-590-0x00000000392E0000-0x00000000392EA000-memory.dmpFilesize
40KB
-
memory/4336-593-0x000000007260E000-0x000000007260F000-memory.dmpFilesize
4KB
-
memory/4336-594-0x0000000072600000-0x0000000072DB0000-memory.dmpFilesize
7.7MB