Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 01:48

General

  • Target

    c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe

  • Size

    597KB

  • MD5

    01fcb8fb62b7bcf6fa81e765d0c3f571

  • SHA1

    2fb9a233ba5c4ec26c275b10300b2e5b57baa435

  • SHA256

    c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba

  • SHA512

    059f448f4db5e4ca667bc2a7fec0f45705aa9217bdb0bce701670df75cb29739cea2cdd4f1123cd6ff8d164d8552448b28def00c88ae1ff850f8cca0667230ec

  • SSDEEP

    12288:1oGrkbKNHKTGwvqXsIkkTLlrvK94BPbSGgW:1oGIbIHKT7vCgk3lLu61n

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 2 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe
    "C:\Users\Admin\AppData\Local\Temp\c28ec21beda0688372e11e53a55f494fd0278929322019739c0084638716a3ba.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Gelpjen=Get-Content 'C:\Users\Admin\AppData\Local\Temp\fingerstningerne\flagellulae\Usmmeligheds.Tro';$Anigonus=$Gelpjen.SubString(51086,3);.$Anigonus($Gelpjen)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
        3⤵
          PID:2920
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          3⤵
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fingerstningerne\flagellulae\Energiudfoldelsernes.Unt

      Filesize

      326KB

      MD5

      7aeba7b845e6a65ab44f5a6edd1b1469

      SHA1

      b6aa079f69c563d7733cbdbe3e61ef2ab6d9448a

      SHA256

      2649f588f147abad2045a8c4f28f7359a9e4525b913b9fb2ef834b28e8469e1c

      SHA512

      c4fa01f0b7e19f8349fef887e0b8eab9ddc8708eb6cef00f700e30309a00a27fac6fd05dfd456a4b2836aefa1e6ba6cf0830c5ede6d860e6f6275618c7d3713d

    • C:\Users\Admin\AppData\Local\Temp\fingerstningerne\flagellulae\Usmmeligheds.Tro

      Filesize

      49KB

      MD5

      effee95945c050b65310d4e05a17d897

      SHA1

      663db609ae44ccf619242830ca0b6fd20ec481f8

      SHA256

      6439dc73d1ce981c431de40f0a01210c6c14e202bf02c5b2047db7bcf2cca9a6

      SHA512

      bcadab2333af674c6cefdcd3ae0b87016a77fb7908c5b80326ec372642c46f67548623263a889a645945c1bb1e8f0035b199abe461709ab84128e2af7c3a6db2

    • C:\Windows\SysWOW64\bores.lnk

      Filesize

      1KB

      MD5

      e5101611a7d6d7b8cd93b76c7253bf27

      SHA1

      cb4d5a1c2dfefe27de30000c19283e881a385407

      SHA256

      d8ef23c80a92ed65a8ccdd3bf6c114848344ced1bc6f7bdbf28a04d22c132ee7

      SHA512

      4eb32e13803946fafb1044817b903222e142e709e36bfafe490311108f9d066f8e74a73191450793f1076fdbcb9b87c5ea0f39915600aaedbb5a85c1bed5be2c

    • C:\Windows\yer.ini

      Filesize

      38B

      MD5

      e58f8a2dcf15a626bc785906a24d269a

      SHA1

      451f8692070432dbd0232c61631cb49874323fd7

      SHA256

      39b313e3f6e503de2657691e96235891834d12dab42957e62aea1c588c35bc83

      SHA512

      7c33aec2758c72eb727f156ca5946626409a1b2ad22a980801436acacac1bf05eac231a2a0cc2858d369a54cbfa3cafdbd449ce696bf6c8fcecfb53699a75bd3

    • memory/1968-125-0x0000000000760000-0x00000000007A0000-memory.dmp

      Filesize

      256KB

    • memory/1968-124-0x0000000000760000-0x00000000017C2000-memory.dmp

      Filesize

      16.4MB

    • memory/1968-123-0x0000000000760000-0x00000000017C2000-memory.dmp

      Filesize

      16.4MB

    • memory/2708-97-0x0000000073EB0000-0x000000007445B000-memory.dmp

      Filesize

      5.7MB

    • memory/2708-96-0x0000000073EB0000-0x000000007445B000-memory.dmp

      Filesize

      5.7MB

    • memory/2708-100-0x0000000006980000-0x000000000A2E4000-memory.dmp

      Filesize

      57.4MB

    • memory/2708-101-0x0000000073EB0000-0x000000007445B000-memory.dmp

      Filesize

      5.7MB

    • memory/2708-95-0x0000000073EB0000-0x000000007445B000-memory.dmp

      Filesize

      5.7MB

    • memory/2708-94-0x0000000073EB0000-0x000000007445B000-memory.dmp

      Filesize

      5.7MB

    • memory/2708-87-0x0000000073EB1000-0x0000000073EB2000-memory.dmp

      Filesize

      4KB