Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2024, 15:23

General

  • Target

    2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6.ps1

  • Size

    356KB

  • MD5

    c86a89bfbb6695378fb207de8578d206

  • SHA1

    f9a2ab9b571a77c51d5ef5ed90a1a62f4f0f98d5

  • SHA256

    2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6

  • SHA512

    9dec301fe44b8a4f6966a5de911ba8dd8ed60c56cb67008a12feb6c21a6924dd978e0f787dc286cbc530ea5b5a8a73d6c3bcfb7fc2079bbc257f6c4722daad12

  • SSDEEP

    1536:EUKRwevEPGKAjHFTNva119BaPffP5Cfx54awKUZDpUfIvXN9Ll68JxE9g5qvEgzJ:NeG

Malware Config

Extracted

Family

agenttesla

C2

http://103.125.190.248/j/p12m/mawa/30b1acecbda6c5d6ed4c.php

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Drops file in Drivers directory 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\2f12d12ac06ba0762329e9d02c10d4202117c2201b9eaa8361a8e57c908373a6.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l2wadotz\l2wadotz.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES87BE.tmp" "c:\Users\Admin\AppData\Local\Temp\l2wadotz\CSC2F11E646AD34DA1AE363F3C08ECBEC.TMP"
        3⤵
          PID:3164
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:2728
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
          • Drops file in Drivers directory
          • Accesses Microsoft Outlook profiles
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:4428

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES87BE.tmp

        Filesize

        1KB

        MD5

        6da414b1e2b3b3e58fe77a6f520a2aa2

        SHA1

        9f2e22418ce65ea1adb3c535fe4a961b21c86419

        SHA256

        b623126a1ccce6cfcbc4049aa209c4ce349c10815cd3edc4f559506c13742946

        SHA512

        2dba1e7a81624a9b5a6a7b77bd87a12cf3621a5b52b26f852f2a73f302c3c27cb83b5d271d4f38199cf98ce73502469c473eca893f3fc028efa75b3aa1be1d3c

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pdn23jhd.ooj.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\l2wadotz\l2wadotz.dll

        Filesize

        13KB

        MD5

        ded6159efe79b1103abe5c28baabca65

        SHA1

        9344351c310e98c9c47adf1e9004e5e31560b6a5

        SHA256

        4b009ecb7667e62c8f766753d175dec524239fd6cefa049e4104769c502ac117

        SHA512

        023907defeb2671164a43bb38b707a5f3a95a4899296ec2d236a93e0fd704ba2a9a96345204ec1e811122f9fa52f893b9a95515d81358c4ecbe1589e09f709ad

      • \??\c:\Users\Admin\AppData\Local\Temp\l2wadotz\CSC2F11E646AD34DA1AE363F3C08ECBEC.TMP

        Filesize

        652B

        MD5

        f5a32a6cd6c947ec7673d1c6de8b554c

        SHA1

        832f720f7d56a891213d84694ca4d5d9d3535bcc

        SHA256

        091b9e4e2df0258ae664f84e6079d7f0d22eb174b98adf2a759f02fd8711e02e

        SHA512

        1bed1a87e523d011e63866627e9c6b329616b5414664cd2bced0875a5f25ad19a984f35237b9aa362e44d1a0171d895b4a4cbffcc5a0fa7e6ce842c01cc200d3

      • \??\c:\Users\Admin\AppData\Local\Temp\l2wadotz\l2wadotz.0.cs

        Filesize

        13KB

        MD5

        e03b1e7ba7f1a53a7e10c0fd9049f437

        SHA1

        3bb851a42717eeb588eb7deadfcd04c571c15f41

        SHA256

        3ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427

        SHA512

        a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f

      • \??\c:\Users\Admin\AppData\Local\Temp\l2wadotz\l2wadotz.cmdline

        Filesize

        327B

        MD5

        531032d90a4054cd2c7b4f79847aed9e

        SHA1

        217abb56bc227a6ae37489536ff9aabedeb45b47

        SHA256

        bf69fb9b63856fb1dd1302c6a9eab27a4c499d186f469d35762978b1be7e96af

        SHA512

        b7cf1fdd76386eb9cbc67f0a7e09d28947405abb15ee1bbb6856d4aa91b77b6d0d7276f5f60456c15096254e877a335e10466cf771dede1d02155f5c8c9147d5

      • memory/3996-13-0x00000255A1BE0000-0x00000255A1C56000-memory.dmp

        Filesize

        472KB

      • memory/3996-31-0x00007FF820BB0000-0x00007FF821671000-memory.dmp

        Filesize

        10.8MB

      • memory/3996-12-0x00007FF820BB0000-0x00007FF821671000-memory.dmp

        Filesize

        10.8MB

      • memory/3996-11-0x00007FF820BB0000-0x00007FF821671000-memory.dmp

        Filesize

        10.8MB

      • memory/3996-6-0x00000255888A0000-0x00000255888C2000-memory.dmp

        Filesize

        136KB

      • memory/3996-26-0x00000255889B0000-0x00000255889BA000-memory.dmp

        Filesize

        40KB

      • memory/3996-0-0x00007FF820BB3000-0x00007FF820BB5000-memory.dmp

        Filesize

        8KB

      • memory/4428-28-0x0000000000400000-0x000000000043C000-memory.dmp

        Filesize

        240KB

      • memory/4428-32-0x0000000005AD0000-0x0000000006074000-memory.dmp

        Filesize

        5.6MB

      • memory/4428-33-0x0000000005470000-0x0000000005502000-memory.dmp

        Filesize

        584KB

      • memory/4428-34-0x0000000005730000-0x00000000057CC000-memory.dmp

        Filesize

        624KB

      • memory/4428-35-0x00000000056F0000-0x0000000005708000-memory.dmp

        Filesize

        96KB

      • memory/4428-36-0x0000000006430000-0x0000000006496000-memory.dmp

        Filesize

        408KB

      • memory/4428-38-0x00000000067B0000-0x0000000006800000-memory.dmp

        Filesize

        320KB

      • memory/4428-39-0x00000000067A0000-0x00000000067AA000-memory.dmp

        Filesize

        40KB