Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-09-2024 11:32

General

  • Target

    eGDQ.exe

  • Size

    815KB

  • MD5

    54dd90f804a17987733d579f4b6070f3

  • SHA1

    a06c987e52fb94983a1aae077e53d307b57fc82d

  • SHA256

    93a59d26ff52ce12c10c6d5ddc9ae54f13530a6d8f840d0f503ea480a54946f3

  • SHA512

    caeaae422801aa3edc00cc0d3f438469eeeb256fe3d9c3ecb7901324858e5445de174afefe94a36fcae8ca65e6554b72f85f2e9946805b4f9c675232c0b582a6

  • SSDEEP

    12288:ieI7XpCKfXPCM+IUcNSersFORJMP3Gxb7Es3R0efbYa0ebJzA1VUkR:ieINDLLNRrsFO68b7zPTRNGVT

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.alitextile.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Myname@321

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eGDQ.exe
    "C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mHEaiNgR.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:360
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHEaiNgR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C6F.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3680
    • C:\Users\Admin\AppData\Local\Temp\eGDQ.exe
      "C:\Users\Admin\AppData\Local\Temp\eGDQ.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    1c19c16e21c97ed42d5beabc93391fc5

    SHA1

    8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

    SHA256

    1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

    SHA512

    7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    5fc1570dd3ce8d55bbb0dc8939e99b5d

    SHA1

    960679067828774d7ca93762765f5b1d12174ac6

    SHA256

    f5710b17a656e3148113f8b5aec50c5b580e7d2cd42d8a1c3867ff0a7c7c14eb

    SHA512

    0b09bf16af918d80d0daa036a9ee16e6be7f9746378f72b200c15c3b524418dc3dab552a403a248736d7bd54e3ea5e84fabe9ee3d99084b9cf1ec8e5cf8fed76

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rhvvxbli.0y4.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\tmp9C6F.tmp

    Filesize

    1KB

    MD5

    a10f152b92e46260c32a684d6bcf81ac

    SHA1

    3b1d4a53f83c78c3d2ec818a2b7954a2235b2082

    SHA256

    9d5528e0485a3f3d37d89dc3634163df5e0c959c4e5b6d252dfacde5c227227c

    SHA512

    a56fbe1cbaadeb9a15f03c850171ece4583e077e0f79b8cc19290562d8e1cb56c834f3bcbe0ad3dd564213a9a39a950c6e5d0c8f9c303769ba6065df0d01cb23

  • memory/360-510-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/360-468-0x0000000009A60000-0x0000000009A7A000-memory.dmp

    Filesize

    104KB

  • memory/360-78-0x000000006F780000-0x000000006F7CB000-memory.dmp

    Filesize

    300KB

  • memory/360-23-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/360-31-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/360-30-0x0000000008000000-0x0000000008350000-memory.dmp

    Filesize

    3.3MB

  • memory/360-24-0x0000000007610000-0x0000000007632000-memory.dmp

    Filesize

    136KB

  • memory/360-25-0x00000000076B0000-0x0000000007716000-memory.dmp

    Filesize

    408KB

  • memory/360-27-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/360-26-0x0000000007DB0000-0x0000000007E16000-memory.dmp

    Filesize

    408KB

  • memory/2640-66-0x0000000009150000-0x0000000009183000-memory.dmp

    Filesize

    204KB

  • memory/2640-83-0x0000000009670000-0x0000000009704000-memory.dmp

    Filesize

    592KB

  • memory/2640-22-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-18-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-17-0x0000000006AC0000-0x0000000006AF6000-memory.dmp

    Filesize

    216KB

  • memory/2640-501-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-477-0x0000000009600000-0x0000000009608000-memory.dmp

    Filesize

    32KB

  • memory/2640-21-0x00000000071B0000-0x00000000077D8000-memory.dmp

    Filesize

    6.2MB

  • memory/2640-29-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-73-0x0000000009490000-0x0000000009535000-memory.dmp

    Filesize

    660KB

  • memory/2640-68-0x0000000009130000-0x000000000914E000-memory.dmp

    Filesize

    120KB

  • memory/2640-33-0x0000000007FA0000-0x0000000007FBC000-memory.dmp

    Filesize

    112KB

  • memory/2640-35-0x0000000007FF0000-0x000000000803B000-memory.dmp

    Filesize

    300KB

  • memory/2640-67-0x000000006F780000-0x000000006F7CB000-memory.dmp

    Filesize

    300KB

  • memory/2640-37-0x00000000082B0000-0x0000000008326000-memory.dmp

    Filesize

    472KB

  • memory/3192-6-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/3192-4-0x00000000050D0000-0x00000000050DA000-memory.dmp

    Filesize

    40KB

  • memory/3192-36-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/3192-1-0x00000000007A0000-0x000000000086E000-memory.dmp

    Filesize

    824KB

  • memory/3192-7-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/3192-5-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/3192-8-0x0000000073E30000-0x000000007451E000-memory.dmp

    Filesize

    6.9MB

  • memory/3192-0-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

    Filesize

    4KB

  • memory/3192-9-0x0000000006BF0000-0x0000000006C74000-memory.dmp

    Filesize

    528KB

  • memory/3192-10-0x0000000009260000-0x00000000092FC000-memory.dmp

    Filesize

    624KB

  • memory/3192-3-0x0000000005150000-0x00000000051E2000-memory.dmp

    Filesize

    584KB

  • memory/3192-2-0x00000000055B0000-0x0000000005AAE000-memory.dmp

    Filesize

    5.0MB

  • memory/4336-32-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4336-511-0x00000000069E0000-0x0000000006A30000-memory.dmp

    Filesize

    320KB