Analysis

  • max time kernel
    119s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 18:18

General

  • Target

    Shipping_Document.exe

  • Size

    284KB

  • MD5

    10cc03882e85151ad4ca3db541f81cf3

  • SHA1

    be6b86b006b887fdc5abee6e64a25b5f237445a0

  • SHA256

    f2da88c88866585358047c6e08c8fd9c01178c3c8ec61345180d8335c68f3bb7

  • SHA512

    6cdce4f6a27b565d938adfeb59dbc8e9e3e2ed02d86281f62ce7de82febe71c45520bf13ce1834c9662fbf13880ff714227635399c6dce1bc43048852b2abc18

  • SSDEEP

    6144:UYRl7vMcPxo+C0Kl9D7k0UjHCHjQ9mHHa1gNC33FLkvKoNGJxmEa2QUkeS/op+:T4cY1DRUeHjomHHGgN7vKopwQReS/v

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shipping_Document.exe
    "C:\Users\Admin\AppData\Local\Temp\Shipping_Document.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\Shipping_Document.exe
      "C:\Users\Admin\AppData\Local\Temp\Shipping_Document.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3464
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe545f46f8,0x7ffe545f4708,0x7ffe545f4718
      2⤵
        PID:4788
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:4080
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4008
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
          2⤵
            PID:2580
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
            2⤵
              PID:4916
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
              2⤵
                PID:3704
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1
                2⤵
                  PID:2776
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                  2⤵
                    PID:2808
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:8
                    2⤵
                      PID:2844
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2484
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:1
                      2⤵
                        PID:5484
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1952 /prefetch:1
                        2⤵
                          PID:5496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15287315514490318186,7258403060255890934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                          2⤵
                            PID:5656
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4748
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1760
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /4
                              1⤵
                              • Checks SCSI registry key(s)
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4740

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              99afa4934d1e3c56bbce114b356e8a99

                              SHA1

                              3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                              SHA256

                              08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                              SHA512

                              76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              443a627d539ca4eab732bad0cbe7332b

                              SHA1

                              86b18b906a1acd2a22f4b2c78ac3564c394a9569

                              SHA256

                              1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                              SHA512

                              923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              e219b627f6936a59fde8423995475105

                              SHA1

                              80c45d02bd2e3163bf36c35423e75e1b58d15750

                              SHA256

                              385808b0ebcfe5d0122b4cb99ff0c03f6325bdecf3ad2e42e10b27186d8533b2

                              SHA512

                              8bd7c9788c1255e624287033a5dd837440dca0d24d97b58901bb6e6a847795da45807ab3167fc04176b220745cfd695035d7997122ab45dd516c871bbf831f40

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              c3ece959e3f14abc844eb0af280549be

                              SHA1

                              5fd3c2c388ed2fc8d871cde31eb048581add3a86

                              SHA256

                              6509ab75420d19f552ba492dc4aaf61c8c21697187a07115f7022bbcd3dbc49f

                              SHA512

                              06d346f979495c12cde616b835e3bb907c50f0f8abaeae966606cad4a5d269ec4431809511938d29cd5bc44938fd0bb44eefd6ace6acaf045af9e1d4111e6862

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              f995d4b0f3aa20385137cc096699c186

                              SHA1

                              ed2cb92dab74935e4c3f68b66636200b224aaf07

                              SHA256

                              d7adb0f39382172a6e5cf9deabd4ff94f1b10792b12f67fb2bd94f7a3239b567

                              SHA512

                              4d78b1d137cac55f07dfc82cb379b1315c622119c920a8f2b46ec60bccb965c087fb7bee21b7db35a181e7841b1334cb51bc4ffca84f7d9eeab61f40265d070a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              410122bd13e8db399df847c6eb46d3e6

                              SHA1

                              9917b73856fbdbd3c7e45c7ee120b1bc1e0dd9d5

                              SHA256

                              5e10de92038659c666b70d6bc456d8ace7f06b18d5df843f45bcaba5883fe034

                              SHA512

                              10a47e47bfb8c62bc9a44358e0da813897c6dd4960a59b1616df1e134d266c475d141857b3eac515fa14f98ec54b7f68cf92668a63c3777e815b9ae7e9d20332

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              7def62cfd82935bfda44a952bf0abfb3

                              SHA1

                              055022e5a7bf49051ddb9e320a4e17773eb7bbc5

                              SHA256

                              9d0b57f2b0b79e4c0cb7d67fdf722c5e0aa63c57d5a72a4f6a9177e2cc7da8c8

                              SHA512

                              1e180065b78ce65173b314bbca8132dd6a3f1613d322ac3f24c36ea99dab5d2bc53cc56f4cc0f9064a87526ee91e3b46e92cd7db6c441a2906b051c245520d24

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              6f70c2811c065c8a800bf79054ab2be7

                              SHA1

                              5a4db070e2184e05c2602533ffa274f14d807293

                              SHA256

                              92710399183d3a00dae6f43a90cb67e1d24eb01838375d0baf5dbce0234848af

                              SHA512

                              0156a7581eb70297b21c5fd5929791ba4ed87d59b6a5841d2e5c161f9cc42711056e431d2db4ec77b613590846e373d877a22a455750471930e4d3ca8cd1585d

                            • \??\pipe\LOCAL\crashpad_2680_VGSHZWALTXOWVPNY

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/2456-0-0x0000000074EEE000-0x0000000074EEF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2456-5-0x0000000004B70000-0x0000000004B7A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2456-1-0x00000000000D0000-0x000000000011E000-memory.dmp

                              Filesize

                              312KB

                            • memory/2456-2-0x0000000004FC0000-0x0000000005564000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/2456-10-0x0000000074EE0000-0x0000000075690000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2456-3-0x0000000004AB0000-0x0000000004B42000-memory.dmp

                              Filesize

                              584KB

                            • memory/2456-4-0x0000000074EE0000-0x0000000075690000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2456-6-0x0000000004C80000-0x0000000004CC8000-memory.dmp

                              Filesize

                              288KB

                            • memory/3464-7-0x0000000000400000-0x0000000000442000-memory.dmp

                              Filesize

                              264KB

                            • memory/3464-8-0x0000000074EE0000-0x0000000075690000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3464-12-0x0000000006B90000-0x0000000006BE0000-memory.dmp

                              Filesize

                              320KB

                            • memory/3464-9-0x0000000074EE0000-0x0000000075690000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3464-11-0x0000000005570000-0x00000000055D6000-memory.dmp

                              Filesize

                              408KB

                            • memory/3464-14-0x0000000074EE0000-0x0000000075690000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3464-13-0x0000000006C80000-0x0000000006D1C000-memory.dmp

                              Filesize

                              624KB

                            • memory/4740-45-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-51-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-52-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-53-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-54-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-55-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-56-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-57-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-47-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB

                            • memory/4740-46-0x000002623B200000-0x000002623B201000-memory.dmp

                              Filesize

                              4KB