Analysis

  • max time kernel
    132s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 01:15

General

  • Target

    13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe

  • Size

    1.2MB

  • MD5

    0c03d7dee077d930de9992b80d9a7e05

  • SHA1

    0a5132fb57ef3693456fce1b9fbf7f8e577de614

  • SHA256

    13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840

  • SHA512

    d4a26767c13b5770617eed1d1e82f131383a24e92ee79d401e6b69e59adaf24f14f637581cc6915d580efa7da0e03bbdf702214f83abc841de1ae9d43f970c2b

  • SSDEEP

    24576:Am/4rEhEsy4u2ujupAlCna/4rZu3AssPjK1yCb4F5pHqLV3U:AmgAh44wjuu4agg+Pjky/Fbq

Malware Config

Extracted

Family

redline

Botnet

unk777

C2

159.203.177.31:16383

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe
    "C:\Users\Admin\AppData\Local\Temp\13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /C wmic path win32_ComputerSystem get model
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic path win32_ComputerSystem get model
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3944
    • C:\Users\Admin\AppData\Local\Temp\esdzGTgVWf\file.exe
      "C:\Users\Admin\AppData\Local\Temp\esdzGTgVWf\file.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\esdzGTgVWf\file.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qsveNpVbKEJaZ.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4496
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qsveNpVbKEJaZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE678.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2416
      • C:\Users\Admin\AppData\Local\Temp\esdzGTgVWf\file.exe
        "C:\Users\Admin\AppData\Local\Temp\esdzGTgVWf\file.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
    • C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe
      "C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qunOOlTEYv.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5056
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qunOOlTEYv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF9C1.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4852
      • C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe
        "C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe"
        3⤵
        • Executes dropped EXE
        PID:3984
      • C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe
        "C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe"
        3⤵
        • Executes dropped EXE
        PID:3308
      • C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe
        "C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1712
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\13ae0240874eceb39e9dad22310e9a2539b602d12d570e80bce351cd36e10840.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Windows\system32\timeout.exe
        TIMEOUT /T 3
        3⤵
        • Delays execution with timeout.exe
        PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    dbf5bc52736dd0a9e2c4b8994ffae0dc

    SHA1

    322b7d52daae12e13a24476963a6d890413d1cc5

    SHA256

    f046c44322409a6feec49b385180353bcbecf4c3f4be8d3f73fa6d2f5d2857ae

    SHA512

    3e48b2e8b328f01b9886f20f4ccf03668c359a69d1693d53915cdbbde1f63331c845f624bebb7115c31a9883070ab1d01451cf4af943d67960467758f7699879

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    f912fb0528c23b0220d849a1b2b551ce

    SHA1

    af9542a23f3eb77089a90a2323ae722f82b846fe

    SHA256

    890aa3a15926de6d158eee8ea3abee8ccbda260bc6c9bcda23b7865c268193b5

    SHA512

    61a79f9d48270f5f9ba6cb16c6970854466473633ea04f31d7d775d7a167d2b6f68ceda1e7840c7e0007aab5b8130f58b302c7d5ac7d915817aeb5e62e483fd1

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vnedta1f.n03.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\ccbApLEhgdYK\System.exe

    Filesize

    697KB

    MD5

    f74def3bfe7e320eaa41bc114a34c125

    SHA1

    460ccaf2f2f64ce3c851a384443f21adcd2b6880

    SHA256

    20593fe2c2402515d83befde3ee1521523f9cec459b39b014590299a713fe26d

    SHA512

    5721dfeaa8aa165591947c41f6f835de057b86e56ab7d057438b3e70fef7bd654bdc61fbae282da9d42e504ad2665ca6e48d87bda3ab80e8f30543808ea68929

  • C:\Users\Admin\AppData\Local\Temp\esdzGTgVWf\file.exe

    Filesize

    535KB

    MD5

    46a7e52b8d10eb83a8fec69f1fe7c4e8

    SHA1

    a422124f4147ce73ce256f21559ea78e81aabe02

    SHA256

    c00dfb151b814fa6b324455851deae1c67fa14625e8345cbcaf519a809e22027

    SHA512

    8accab80a407c0f0cb9f69b3cd72a445eab01898121e898532666a824fdb9000bc87eb36026c75c33d3c26b3215983ac07da79a5640cdd8a0dde1c55ffbcb9e8

  • C:\Users\Admin\AppData\Local\Temp\tmpE678.tmp

    Filesize

    1KB

    MD5

    91047e711ad93c1a7e1def6d1cd2879f

    SHA1

    5926e38eab3d8329be54acc30423f515e3b3035f

    SHA256

    02910c6200e34ff632d68a5c3df5fe0d89df70af2ad91dc80d2d9e6c87e1a6ea

    SHA512

    30a8db5dc6d63ad659a95ae258fde9f2b0a6da7a27a28d1dff51e268d1a25d440aa3cbac0393c91628461903260d9826e954059eb24a2daa376e1d19476461cd

  • C:\Users\Admin\AppData\Local\Temp\tmpF9C1.tmp

    Filesize

    1KB

    MD5

    971394445d13e2c862c53fac428ea89b

    SHA1

    86466d8e0995dbb3d6bfde774a8692ddaf4ff6db

    SHA256

    84f3cdcd5b0179eb1fd9f3d4fca6bfe35b14b78529a7c498359c2a2cd4ce7058

    SHA512

    1d14f39b1ab35b23d8febc24b4a25fa17b5eaec7b2979e7d34b10358881d244b352391e536709b39b264a4f0307ed17d47edf7ab549cf569a14b26d2d73c8f9f

  • memory/1260-0-0x0000000000C50000-0x0000000000D8C000-memory.dmp

    Filesize

    1.2MB

  • memory/1260-1-0x00007FF92B153000-0x00007FF92B155000-memory.dmp

    Filesize

    8KB

  • memory/1264-27-0x00000000008F0000-0x00000000009A4000-memory.dmp

    Filesize

    720KB

  • memory/1264-34-0x0000000005630000-0x000000000563E000-memory.dmp

    Filesize

    56KB

  • memory/1264-36-0x00000000058A0000-0x0000000005926000-memory.dmp

    Filesize

    536KB

  • memory/1264-37-0x00000000071A0000-0x000000000723C000-memory.dmp

    Filesize

    624KB

  • memory/1264-31-0x0000000005390000-0x000000000539A000-memory.dmp

    Filesize

    40KB

  • memory/1712-140-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1712-170-0x0000000006B70000-0x0000000006BC0000-memory.dmp

    Filesize

    320KB

  • memory/2100-107-0x0000000007570000-0x000000000758A000-memory.dmp

    Filesize

    104KB

  • memory/2100-42-0x00000000025E0000-0x0000000002616000-memory.dmp

    Filesize

    216KB

  • memory/2100-102-0x00000000072A0000-0x00000000072AA000-memory.dmp

    Filesize

    40KB

  • memory/2100-101-0x0000000007230000-0x000000000724A000-memory.dmp

    Filesize

    104KB

  • memory/2100-100-0x0000000007870000-0x0000000007EEA000-memory.dmp

    Filesize

    6.5MB

  • memory/2100-105-0x0000000007460000-0x000000000746E000-memory.dmp

    Filesize

    56KB

  • memory/2100-43-0x0000000005190000-0x00000000057B8000-memory.dmp

    Filesize

    6.2MB

  • memory/2100-104-0x0000000007430000-0x0000000007441000-memory.dmp

    Filesize

    68KB

  • memory/2100-78-0x000000006FF60000-0x000000006FFAC000-memory.dmp

    Filesize

    304KB

  • memory/2100-108-0x0000000007550000-0x0000000007558000-memory.dmp

    Filesize

    32KB

  • memory/2100-77-0x0000000006480000-0x00000000064B2000-memory.dmp

    Filesize

    200KB

  • memory/3892-119-0x0000000005AC0000-0x0000000005E14000-memory.dmp

    Filesize

    3.3MB

  • memory/3892-144-0x000000006FF60000-0x000000006FFAC000-memory.dmp

    Filesize

    304KB

  • memory/3892-154-0x0000000007370000-0x0000000007413000-memory.dmp

    Filesize

    652KB

  • memory/3892-165-0x0000000007650000-0x0000000007661000-memory.dmp

    Filesize

    68KB

  • memory/3892-166-0x0000000007690000-0x00000000076A4000-memory.dmp

    Filesize

    80KB

  • memory/4344-76-0x0000000005B50000-0x0000000005C5A000-memory.dmp

    Filesize

    1.0MB

  • memory/4344-73-0x00000000058A0000-0x00000000058DC000-memory.dmp

    Filesize

    240KB

  • memory/4344-71-0x0000000005F40000-0x0000000006558000-memory.dmp

    Filesize

    6.1MB

  • memory/4344-72-0x0000000005800000-0x0000000005812000-memory.dmp

    Filesize

    72KB

  • memory/4344-67-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4496-74-0x0000000006170000-0x000000000618E000-memory.dmp

    Filesize

    120KB

  • memory/4496-75-0x00000000061A0000-0x00000000061EC000-memory.dmp

    Filesize

    304KB

  • memory/4496-99-0x0000000007400000-0x00000000074A3000-memory.dmp

    Filesize

    652KB

  • memory/4496-106-0x00000000076D0000-0x00000000076E4000-memory.dmp

    Filesize

    80KB

  • memory/4496-98-0x0000000006730000-0x000000000674E000-memory.dmp

    Filesize

    120KB

  • memory/4496-79-0x000000006FF60000-0x000000006FFAC000-memory.dmp

    Filesize

    304KB

  • memory/4496-44-0x00000000052A0000-0x00000000052C2000-memory.dmp

    Filesize

    136KB

  • memory/4496-46-0x0000000005B20000-0x0000000005B86000-memory.dmp

    Filesize

    408KB

  • memory/4496-62-0x0000000005B90000-0x0000000005EE4000-memory.dmp

    Filesize

    3.3MB

  • memory/4496-103-0x0000000007710000-0x00000000077A6000-memory.dmp

    Filesize

    600KB

  • memory/4496-45-0x0000000005A00000-0x0000000005A66000-memory.dmp

    Filesize

    408KB

  • memory/4724-30-0x00000000052D0000-0x0000000005362000-memory.dmp

    Filesize

    584KB

  • memory/4724-32-0x0000000005290000-0x00000000052A2000-memory.dmp

    Filesize

    72KB

  • memory/4724-33-0x00000000052C0000-0x00000000052CA000-memory.dmp

    Filesize

    40KB

  • memory/4724-35-0x00000000056F0000-0x0000000005750000-memory.dmp

    Filesize

    384KB

  • memory/4724-29-0x00000000057E0000-0x0000000005D84000-memory.dmp

    Filesize

    5.6MB

  • memory/4724-28-0x0000000000920000-0x00000000009AC000-memory.dmp

    Filesize

    560KB

  • memory/5056-155-0x000000006FF60000-0x000000006FFAC000-memory.dmp

    Filesize

    304KB