Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 01:46

General

  • Target

    cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe

  • Size

    1.2MB

  • MD5

    c40b40bfaf8696cd282ccb46929c4f2e

  • SHA1

    f929cfe6fa8c590ecdf4c53071769689493eda90

  • SHA256

    cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a

  • SHA512

    deb90700f1efc9acd0b71498f522b3189e35573c10abbdb92877851fc2bb027731e71036c8ffc3cd46eb2706cc666f1bfd0c57b32ce05705e0e97eadc652b4d1

  • SSDEEP

    12288:E5MFKLltmvsXEuXfHgYxJig3Qt5qUu34HE1YQ/e9i72l:VFKOv0fHgYxJigKHE1YQWkE

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe
    "C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3000
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uNcbBGFuPZgDr.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uNcbBGFuPZgDr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7C5F.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1332
    • C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe
      "C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe"
      2⤵
        PID:3208
      • C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe
        "C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe"
        2⤵
          PID:116
        • C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe
          "C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe"
          2⤵
            PID:1940
          • C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe
            "C:\Users\Admin\AppData\Local\Temp\cd911ede1b7b20441b5955a511f13d75ba687eee9ae1b2a5d2b960a36f44d76a.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2812
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3872 /prefetch:8
          1⤵
            PID:4052

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            968cb9309758126772781b83adb8a28f

            SHA1

            8da30e71accf186b2ba11da1797cf67f8f78b47c

            SHA256

            92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

            SHA512

            4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            18KB

            MD5

            3fbeec226734a04846fdbb57e10b7e4a

            SHA1

            bd6e1d43aaee291f2bbe859cde95b0b65a1b3616

            SHA256

            baa667681c4e02cce4fdd4f6bf5b0b1977d8073f11fe202e6594dd09a7653619

            SHA512

            9014c389ca463491f8e8ae994e0d8d6fe34b84b126ed4d1fd42251d416a6d0d26bcf7461edbabb32d75ac5c0ca12e18aec19a7edbed8060483613541b0dadbfc

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qxh125dp.gdu.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\tmp7C5F.tmp

            Filesize

            1KB

            MD5

            c572d868aec9b4f308a7d82f0d9a68d9

            SHA1

            fe050458f62443341f1c1396f40a5df07bb3c76a

            SHA256

            33414fbbeb0d2ce9ab517570a4c7156a5f54fb9aa242b69f3521c8360e165cf8

            SHA512

            5afa416ed49d94672a84d09d31e5c10ccd583857565ecf3bca242b16e207305898d8e2234d69380a36a1a2d952cab9afdb4bfff53ab6c3a219338100b3d33c21

          • memory/2684-8-0x00000000090B0000-0x000000000914C000-memory.dmp

            Filesize

            624KB

          • memory/2684-5-0x0000000005450000-0x000000000545A000-memory.dmp

            Filesize

            40KB

          • memory/2684-6-0x00000000055E0000-0x00000000055F0000-memory.dmp

            Filesize

            64KB

          • memory/2684-7-0x0000000006940000-0x00000000069C4000-memory.dmp

            Filesize

            528KB

          • memory/2684-4-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/2684-3-0x00000000054C0000-0x0000000005552000-memory.dmp

            Filesize

            584KB

          • memory/2684-0-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/2684-2-0x00000000059D0000-0x0000000005F74000-memory.dmp

            Filesize

            5.6MB

          • memory/2684-1-0x00000000009B0000-0x0000000000A52000-memory.dmp

            Filesize

            648KB

          • memory/2684-42-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/2812-36-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2812-84-0x0000000006770000-0x00000000067C0000-memory.dmp

            Filesize

            320KB

          • memory/2864-70-0x0000000007210000-0x000000000721A000-memory.dmp

            Filesize

            40KB

          • memory/2864-56-0x00000000711E0000-0x000000007122C000-memory.dmp

            Filesize

            304KB

          • memory/2864-83-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/2864-18-0x0000000004EB0000-0x0000000004ED2000-memory.dmp

            Filesize

            136KB

          • memory/2864-19-0x0000000005690000-0x00000000056F6000-memory.dmp

            Filesize

            408KB

          • memory/2864-16-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/2864-68-0x00000000077E0000-0x0000000007E5A000-memory.dmp

            Filesize

            6.5MB

          • memory/3000-45-0x0000000006BF0000-0x0000000006C22000-memory.dmp

            Filesize

            200KB

          • memory/3000-72-0x0000000007160000-0x0000000007171000-memory.dmp

            Filesize

            68KB

          • memory/3000-41-0x0000000005600000-0x0000000005954000-memory.dmp

            Filesize

            3.3MB

          • memory/3000-65-0x0000000006210000-0x000000000622E000-memory.dmp

            Filesize

            120KB

          • memory/3000-67-0x0000000006E30000-0x0000000006ED3000-memory.dmp

            Filesize

            652KB

          • memory/3000-69-0x0000000006F60000-0x0000000006F7A000-memory.dmp

            Filesize

            104KB

          • memory/3000-44-0x00000000060B0000-0x00000000060FC000-memory.dmp

            Filesize

            304KB

          • memory/3000-15-0x0000000004ED0000-0x00000000054F8000-memory.dmp

            Filesize

            6.2MB

          • memory/3000-71-0x00000000071E0000-0x0000000007276000-memory.dmp

            Filesize

            600KB

          • memory/3000-46-0x00000000711E0000-0x000000007122C000-memory.dmp

            Filesize

            304KB

          • memory/3000-73-0x0000000007190000-0x000000000719E000-memory.dmp

            Filesize

            56KB

          • memory/3000-74-0x00000000071A0000-0x00000000071B4000-memory.dmp

            Filesize

            80KB

          • memory/3000-75-0x00000000072A0000-0x00000000072BA000-memory.dmp

            Filesize

            104KB

          • memory/3000-76-0x0000000007280000-0x0000000007288000-memory.dmp

            Filesize

            32KB

          • memory/3000-79-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/3000-43-0x0000000005C10000-0x0000000005C2E000-memory.dmp

            Filesize

            120KB

          • memory/3000-14-0x00007FFEB4890000-0x00007FFEB4A85000-memory.dmp

            Filesize

            2.0MB

          • memory/3000-20-0x0000000004E20000-0x0000000004E86000-memory.dmp

            Filesize

            408KB

          • memory/3000-13-0x0000000000B50000-0x0000000000B86000-memory.dmp

            Filesize

            216KB