Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 14:40

General

  • Target

    561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe

  • Size

    3.5MB

  • MD5

    d6f6d056221be8a9545efc7dff08e56a

  • SHA1

    5b245398672670653a2afdd33f0e0b02b0a5fc41

  • SHA256

    561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b

  • SHA512

    452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b

  • SSDEEP

    98304:/5KgsYz+zd0ympj+Wx8SLkzwTUCmpsG51Q28oFpePq:/qYqz25+8dkUwCasP2lpeP

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
    "C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tUwYoIHWfleeN.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2956
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tUwYoIHWfleeN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E96.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2640
    • C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
      "C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1824
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pJlDdUQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6EAB.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1668
      • C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
        "C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PwrtvLGqv.exe"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:680
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PwrtvLGqv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp99EF.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:592
        • C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
          "C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
            "C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:956
            • C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe
              "C:\Users\Admin\AppData\Local\Temp\561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b.exe"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp3E96.tmp

    Filesize

    1KB

    MD5

    067dda46d75fd3143d8669e9bf81957c

    SHA1

    a9f4096fc6ed52df61a44c71d912685bb0309080

    SHA256

    ca9c9967d6a576ec94b3573abf6cc979f89e8577ed42cb1daf3afd9e9297cbea

    SHA512

    55f9e7d8e2fc89e7f8a1c98881436d197c43ea06b8caae58e5ee020109883674dd990108b3354d9b5eab430463afac751fd56488d289d2ec8777ffcc8a19cf84

  • C:\Users\Admin\AppData\Local\Temp\tmp6EAB.tmp

    Filesize

    1KB

    MD5

    48f671930a38cb862696af4c70a55b0f

    SHA1

    5a0b47dc13236fd1d977d81178e298f9cd263847

    SHA256

    59466aa0c72702c200d9fc005fe64fe307469f07ddf26744518d5ee889b3791e

    SHA512

    056ff5048220c16e00c4d2181097fb4e76f656f53e75c982ebfb2ca73bd8d143766a57bddf400a27936bc35fa41e1eb355ad55eed8ce582176e209cbfb5b7b83

  • C:\Users\Admin\AppData\Local\Temp\tmp99EF.tmp

    Filesize

    1KB

    MD5

    94c4b9ad613eec1ad9a5b4da31647ede

    SHA1

    0226d88947b5b0fa8c69536f3d1f749ca670399d

    SHA256

    45bee562f3f44692910388f63cfb608826e733e2ad9c72a37536f43761d015b0

    SHA512

    e6c7aecc0316977cc72a025012dd85fb661575d9e86c8482212a06844d856a489c1cd9b7217e9c419003b3e6b5ef75e26e2688453febb0ddcf17bbe0003bf23f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    bdf03970d0116c75dcd4df7dd0c3ae12

    SHA1

    f787ed0f1c1f7a5d720e5d2d964c75299758c1f4

    SHA256

    cb769bb01f6db6a869ec8082ff24bb7d43070760e6fa64c29cbd823ccbe22d7e

    SHA512

    a987894a765e22d4af0eba1072d93501414ba70994c596429c50ce3b5d739a37d25fd4d16ed01d1cc88becacad833d17364db5df0fd64f1eb70e5f1fe8f65439

  • C:\Users\Admin\AppData\Roaming\pJlDdUQ.exe

    Filesize

    3.5MB

    MD5

    d6f6d056221be8a9545efc7dff08e56a

    SHA1

    5b245398672670653a2afdd33f0e0b02b0a5fc41

    SHA256

    561f3664b4dcc39b1eb79236231b0e36fb5fde10c8bda6d356d2fa63925f3a6b

    SHA512

    452bc38856d088d6c0376cce6ece9819ec4bf22ddb8cee439a2e3444137dea0e3d78b2200ecf209bb9a1a3bc7920cfbcb41ac4ae45918cd947e45b884d853e1b

  • memory/900-119-0x0000000000660000-0x000000000067E000-memory.dmp

    Filesize

    120KB

  • memory/900-87-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-76-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-72-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-86-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-74-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-78-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-121-0x00000000080D0000-0x000000000824A000-memory.dmp

    Filesize

    1.5MB

  • memory/900-120-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/900-81-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/900-82-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-84-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-90-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-88-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/900-89-0x0000000000400000-0x000000000065E000-memory.dmp

    Filesize

    2.4MB

  • memory/956-162-0x00000000005F0000-0x00000000005FE000-memory.dmp

    Filesize

    56KB

  • memory/956-161-0x00000000003D0000-0x00000000003EC000-memory.dmp

    Filesize

    112KB

  • memory/956-160-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/956-163-0x0000000006070000-0x00000000060F2000-memory.dmp

    Filesize

    520KB

  • memory/1724-176-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2312-147-0x0000000005F60000-0x0000000006062000-memory.dmp

    Filesize

    1.0MB

  • memory/2312-144-0x0000000000400000-0x0000000000536000-memory.dmp

    Filesize

    1.2MB

  • memory/2312-145-0x0000000000640000-0x000000000065E000-memory.dmp

    Filesize

    120KB

  • memory/2312-146-0x00000000003F0000-0x0000000000406000-memory.dmp

    Filesize

    88KB

  • memory/2784-29-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-54-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-51-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-47-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-42-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-38-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-34-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-32-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-30-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-61-0x00000000085C0000-0x0000000008862000-memory.dmp

    Filesize

    2.6MB

  • memory/2784-31-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-33-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-36-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-39-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-44-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-45-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-48-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-50-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-53-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-28-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-57-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-58-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-60-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-14-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-20-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-16-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-18-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2784-25-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-23-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2784-24-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/3024-26-0x00000000743A0000-0x0000000074A8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-0-0x00000000743AE000-0x00000000743AF000-memory.dmp

    Filesize

    4KB

  • memory/3024-6-0x000000000C300000-0x000000000C630000-memory.dmp

    Filesize

    3.2MB

  • memory/3024-5-0x0000000000580000-0x0000000000596000-memory.dmp

    Filesize

    88KB

  • memory/3024-4-0x0000000000560000-0x0000000000570000-memory.dmp

    Filesize

    64KB

  • memory/3024-3-0x0000000000540000-0x000000000055E000-memory.dmp

    Filesize

    120KB

  • memory/3024-2-0x00000000743A0000-0x0000000074A8E000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-1-0x0000000000B90000-0x0000000000F16000-memory.dmp

    Filesize

    3.5MB