Analysis

  • max time kernel
    51s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 01:47

General

  • Target

    a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe

  • Size

    917KB

  • MD5

    d299f9454bbcd4f38b61cce01fd4c7ea

  • SHA1

    e469c6c3e0e83a235ae5795e5d84f484bb82e0ca

  • SHA256

    a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02

  • SHA512

    1a7254f5ceabd0c18dfa197134b527b8969ae4af1aa4b6fc82e2ae147dc185b5dcf71fa5afe1d8f3a43d3edec785ebcb4b0ae2caa839b63db5f4c5500da132e4

  • SSDEEP

    24576:BsViyyKIAHDPKMtGKXLEdqbzghPQP+0Norxvl:aVihKIkDX3AEbaQP+0Norxd

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe
    "C:\Users\Admin\AppData\Local\Temp\a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe
      "C:\Users\Admin\AppData\Local\Temp\a68a4bc1f558e8297566af69b8258b2d6596a0f2762e95c963d71f5cd327eb02.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4088-11-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4088-18-0x00000000747A0000-0x0000000074F50000-memory.dmp

    Filesize

    7.7MB

  • memory/4088-17-0x0000000006040000-0x0000000006090000-memory.dmp

    Filesize

    320KB

  • memory/4088-16-0x0000000005250000-0x00000000052B6000-memory.dmp

    Filesize

    408KB

  • memory/4088-15-0x00000000747A0000-0x0000000074F50000-memory.dmp

    Filesize

    7.7MB

  • memory/4088-13-0x00000000747A0000-0x0000000074F50000-memory.dmp

    Filesize

    7.7MB

  • memory/5052-5-0x00000000747A0000-0x0000000074F50000-memory.dmp

    Filesize

    7.7MB

  • memory/5052-7-0x0000000004D30000-0x0000000004D3E000-memory.dmp

    Filesize

    56KB

  • memory/5052-8-0x0000000005060000-0x0000000005074000-memory.dmp

    Filesize

    80KB

  • memory/5052-9-0x00000000046F0000-0x000000000478A000-memory.dmp

    Filesize

    616KB

  • memory/5052-10-0x000000000B2C0000-0x000000000B35C000-memory.dmp

    Filesize

    624KB

  • memory/5052-6-0x0000000004D00000-0x0000000004D18000-memory.dmp

    Filesize

    96KB

  • memory/5052-4-0x0000000004CF0000-0x0000000004CFA000-memory.dmp

    Filesize

    40KB

  • memory/5052-14-0x00000000747A0000-0x0000000074F50000-memory.dmp

    Filesize

    7.7MB

  • memory/5052-0-0x00000000747AE000-0x00000000747AF000-memory.dmp

    Filesize

    4KB

  • memory/5052-3-0x0000000004D50000-0x0000000004DE2000-memory.dmp

    Filesize

    584KB

  • memory/5052-2-0x0000000005300000-0x00000000058A4000-memory.dmp

    Filesize

    5.6MB

  • memory/5052-1-0x0000000000200000-0x00000000002EC000-memory.dmp

    Filesize

    944KB