Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 01:32

General

  • Target

    efbea3c102bcb9f7f4239416a6f16a00d75d44ba75b8c6c01b9e1f226ec3e3d7.exe

  • Size

    1.2MB

  • MD5

    747c66213929acd44b0ef333d8bce70f

  • SHA1

    72762d04bea2063797c908fdf69c17660ee34456

  • SHA256

    efbea3c102bcb9f7f4239416a6f16a00d75d44ba75b8c6c01b9e1f226ec3e3d7

  • SHA512

    9eb88af9ad2e3982cec02440b8d9edb16779158e5ef960298c0bfcaa4bc6752fb8e9fe3562c9fc1e3a3a8cbb3c705b3d11ab9c65272daf6169d8fd756704efa5

  • SSDEEP

    24576:gw/4rEOWulpZlHbcWZGW/4rZu3AssPjK1yCb4F5pHqLV3U:gwgoWv7QXWgg+Pjky/Fbq

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efbea3c102bcb9f7f4239416a6f16a00d75d44ba75b8c6c01b9e1f226ec3e3d7.exe
    "C:\Users\Admin\AppData\Local\Temp\efbea3c102bcb9f7f4239416a6f16a00d75d44ba75b8c6c01b9e1f226ec3e3d7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\system32\cmd.exe
      "cmd" /C wmic path win32_ComputerSystem get model
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic path win32_ComputerSystem get model
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2920
    • C:\Users\Admin\AppData\Local\Temp\XinzQKbdOh\piyx9G8vIRvjXxc.exe
      "C:\Users\Admin\AppData\Local\Temp\XinzQKbdOh\piyx9G8vIRvjXxc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\XinzQKbdOh\piyx9G8vIRvjXxc.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kCpzIBXuOwHQnl.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1284
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kCpzIBXuOwHQnl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5551.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2516
      • C:\Users\Admin\AppData\Local\Temp\XinzQKbdOh\piyx9G8vIRvjXxc.exe
        "C:\Users\Admin\AppData\Local\Temp\XinzQKbdOh\piyx9G8vIRvjXxc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
    • C:\Users\Admin\AppData\Local\Temp\NDJUAozuUfaw\System.exe
      "C:\Users\Admin\AppData\Local\Temp\NDJUAozuUfaw\System.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\NDJUAozuUfaw\System.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2892
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qunOOlTEYv.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2308
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qunOOlTEYv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3D10.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1936
      • C:\Users\Admin\AppData\Local\Temp\NDJUAozuUfaw\System.exe
        "C:\Users\Admin\AppData\Local\Temp\NDJUAozuUfaw\System.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2756
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\efbea3c102bcb9f7f4239416a6f16a00d75d44ba75b8c6c01b9e1f226ec3e3d7.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\system32\timeout.exe
        TIMEOUT /T 3
        3⤵
        • Delays execution with timeout.exe
        PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NDJUAozuUfaw\System.exe

    Filesize

    697KB

    MD5

    f74def3bfe7e320eaa41bc114a34c125

    SHA1

    460ccaf2f2f64ce3c851a384443f21adcd2b6880

    SHA256

    20593fe2c2402515d83befde3ee1521523f9cec459b39b014590299a713fe26d

    SHA512

    5721dfeaa8aa165591947c41f6f835de057b86e56ab7d057438b3e70fef7bd654bdc61fbae282da9d42e504ad2665ca6e48d87bda3ab80e8f30543808ea68929

  • C:\Users\Admin\AppData\Local\Temp\XinzQKbdOh\piyx9G8vIRvjXxc.exe

    Filesize

    537KB

    MD5

    9954659fe9b70868e651001b52d17691

    SHA1

    f2035cf1739bd6da81328cdf964f739fa9090110

    SHA256

    788006d305b062dfa22b0acf645493fb6ff8c97955d2cd53c89d0df8383dcf86

    SHA512

    1ac3216f2c3ff24186f565cef6af8816bcba1d96a2ffa9dc242390852db50fdc0411675618ed1d9ef17054fdab122cc6a91e9857805464d540e93ee83d8746ca

  • C:\Users\Admin\AppData\Local\Temp\tmp3D10.tmp

    Filesize

    1KB

    MD5

    36a990d3663ac3828be59159c7f1884f

    SHA1

    cb9ce080d2c9e9ffc9b167b873cb0c11b494d502

    SHA256

    2434759475b665baf3b82ba9f8bac13d2e330705974ebc648ea2ae7ac8ca21d2

    SHA512

    bbb86e4eaf17fa4364c3194ce8e7cd81e75d1abc465b6df0c98d940de5b2a1a2e822568e1fdeede88d7d909a92975b128dc4580bbb40cde656816082eea43d3f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LW6M49TAHZGGAVUADDDJ.temp

    Filesize

    7KB

    MD5

    2a1c463a1916d37c28c8f88e8157cb0a

    SHA1

    8fc3338118b5ac9f36b236b682d7918d8b48b6a6

    SHA256

    8e892ad23ff9c431a8ab9b96bb13a7189367d304693d27c3c52b857e766cfe04

    SHA512

    56d0c1e42ce94f2bcd9f2c50c98fb034c646f8d3e4766ecc201b26ccc4dad24ccab2ca7eb95ae88a842cdd1efe59737ad431beec16441c0c89e86d0d835b5d8f

  • memory/2572-25-0x0000000004280000-0x00000000042E0000-memory.dmp

    Filesize

    384KB

  • memory/2572-20-0x0000000000AF0000-0x0000000000B7C000-memory.dmp

    Filesize

    560KB

  • memory/2572-22-0x0000000000550000-0x0000000000562000-memory.dmp

    Filesize

    72KB

  • memory/2572-23-0x0000000000910000-0x000000000091A000-memory.dmp

    Filesize

    40KB

  • memory/2572-24-0x0000000000970000-0x000000000097E000-memory.dmp

    Filesize

    56KB

  • memory/2736-26-0x00000000047F0000-0x0000000004876000-memory.dmp

    Filesize

    536KB

  • memory/2736-21-0x0000000001060000-0x0000000001114000-memory.dmp

    Filesize

    720KB

  • memory/2756-40-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2756-42-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2756-51-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2756-53-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2756-49-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2756-48-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2756-46-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2756-44-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2796-0-0x000007FEF5D43000-0x000007FEF5D44000-memory.dmp

    Filesize

    4KB

  • memory/2796-1-0x0000000000A60000-0x0000000000B9E000-memory.dmp

    Filesize

    1.2MB