Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 01:21

General

  • Target

    726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe

  • Size

    4.6MB

  • MD5

    513e198d8d3251a4114115603be2ef5b

  • SHA1

    fc273f9f478d807b87bf17c9ebedd49fe4451509

  • SHA256

    726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94

  • SHA512

    b689ea55a907f743af6f6c44cd175ca7dccd346fffca25aae9f472745d8c4248dd9f0ec8380fb936e95067d35768282991b327073c29baab1c78bf57559004c9

  • SSDEEP

    98304:IsTtFCMoEBCSbrQJEqAQPqGwxMDYNaYHzPcLZc/9fFQucTeu52Xu:IitFXoBo0rVwxWYNzHg21NQucTj5w

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 12 IoCs
  • Sectoprat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 42 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe
    "C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\system32\cmd.exe
      "cmd" /C wmic path win32_ComputerSystem get model
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic path win32_ComputerSystem get model
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2800
    • C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe
      "C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:484
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sgBDFAKb.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sgBDFAKb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5744.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1652
      • C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe
        "C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1116
    • C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe
      "C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XyJQWVqVwSU.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1588
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XyJQWVqVwSU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E8B.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1624
      • C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe
        "C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C TIMEOUT /T 3 && DEL /f "C:\Users\Admin\AppData\Local\Temp\726653ca6a7c8ba9be0c2a8be957b464bd108580e9e6135cce2b11b124180e94.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Windows\system32\timeout.exe
        TIMEOUT /T 3
        3⤵
        • Delays execution with timeout.exe
        PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AheIwvkzQRQG\AsuUQa4j6S2HpNn.exe

    Filesize

    2.3MB

    MD5

    20cf29e88f8334623bacf9b4a786583f

    SHA1

    92177c432f500254d8b1b7531898a7f73a9f2ab6

    SHA256

    6b0ee9d248c8927e65ada232489f00f04febc1d735d58637a881237c09371a12

    SHA512

    131056feef1acb34d5f18b0a4997240314809f9800beda7c7878d9f0506ae10d707f458abb0e1f5dc9ab86c28a3d94801a4c9654320a8608b55c256edbe6ce30

  • C:\Users\Admin\AppData\Local\Temp\heFznRljon\BLClOKQwCpC7NEW.exe

    Filesize

    2.3MB

    MD5

    3111fce09bd593632338703ec7b79ec4

    SHA1

    0692697feadf4502ca36d468de45942d9857f9b5

    SHA256

    ddbaa3837446cb7c45a6f00ab198d6460a16db74d869887d2e9d0de37ff364e2

    SHA512

    2e0ef5795621b6d9b80a16949d512a7ca18415397f3dd515608b0f998fae0b3c9c4b720d867396a4a1e894460f185c5150615f9115e8e11a008b5ccc4721ccd6

  • C:\Users\Admin\AppData\Local\Temp\tmp5744.tmp

    Filesize

    1KB

    MD5

    800b9c2a720a4670d4cfa7eec9e735ea

    SHA1

    1265888aa658ae743c95c9afc9b51c6fcb4d0064

    SHA256

    198798155a02db59b5218986efe5716e84aaf211eb7723489f2ca0f03d07d6b9

    SHA512

    42ca7600220eed948aefe4fd97c210d4aa2ea6d259053f43ef2e756236381ef88fc84eea3e36e88afe7c024ced201bd2c1fb638aefeab7e018e1f99e329f0739

  • C:\Users\Admin\AppData\Local\Temp\tmp6E8B.tmp

    Filesize

    1KB

    MD5

    d22986d518f9224e416136a4dd2257f0

    SHA1

    d8e6c4464737ceaaafbf1a70e206e4edb8c3d6ab

    SHA256

    1f6398fcdd9504151fc8e5ed1d3ef46d9e4b40497770ee2dc7804ed82c8600ae

    SHA512

    d520a1392770317aa96905ff7766da053cc7d1ea32e739737bb8d75418f54e67a0e69cfc5d3d64028c19ab606fe7cd6c84633eb6ec6dd805144b2f528a0689e7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    474da173799ca2a886cb4923563354fd

    SHA1

    18002113972aabcb9caaabf3a74559928e81fab5

    SHA256

    7de6f4df1fd58bd025f006e119b58cd80f0507503a8b137d7a6993be9ce34efd

    SHA512

    a6a13fff197f662106df45f5a39af114ae5c6d62c4ba07d20b1a69d4c767d66dd2df6623c84e1573791cce7beec9143bd50082ddee784b5ed816b232275418d8

  • memory/1116-63-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-59-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-58-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-62-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-60-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-40-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-38-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-44-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-42-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-57-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-55-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1116-52-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-50-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-48-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-46-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-61-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-64-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-68-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-67-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-69-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-66-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1116-65-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/1524-106-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-98-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-117-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-107-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-108-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-109-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-103-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-102-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1524-100-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-96-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-94-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-92-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-90-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-88-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-86-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-110-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-105-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-115-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-116-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-114-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-113-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-112-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/1524-111-0x0000000000400000-0x0000000000A0A000-memory.dmp

    Filesize

    6.0MB

  • memory/2532-22-0x0000000000420000-0x000000000043E000-memory.dmp

    Filesize

    120KB

  • memory/2532-20-0x00000000011E0000-0x0000000001436000-memory.dmp

    Filesize

    2.3MB

  • memory/2532-24-0x0000000008DF0000-0x000000000900E000-memory.dmp

    Filesize

    2.1MB

  • memory/2644-1-0x0000000000F60000-0x0000000001404000-memory.dmp

    Filesize

    4.6MB

  • memory/2644-0-0x000007FEF4EC3000-0x000007FEF4EC4000-memory.dmp

    Filesize

    4KB

  • memory/2756-21-0x0000000000B60000-0x0000000000DB0000-memory.dmp

    Filesize

    2.3MB

  • memory/2756-23-0x000000000ADF0000-0x000000000B008000-memory.dmp

    Filesize

    2.1MB