Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 01:46

General

  • Target

    c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6.exe

  • Size

    2.2MB

  • MD5

    0c3fb6f18fef7082a5e471492a4ec464

  • SHA1

    02e89c382c50a7745aa8fa8f489fe6a66f9d4d64

  • SHA256

    c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6

  • SHA512

    57d4dd97a88abe4fe9e1505a21e58bc693d9c1266447d8bca0d13d92b6576fe390b7fe1cd21dc09108fd7d30a0b3903bdfe1fef5ca876f047abeb7d58677a243

  • SSDEEP

    49152:itYXs8Xh9t4uNRsezTQrm22obPhGcBV2aabQbziSFxc0sIIHpBXPe7+:itY88x9t4upQC2J8cBVjuOOpFL

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7390139954:AAFw-89dzufZnN9iQ-qMJ7xuGsXRrzvXAEI/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 21 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6.exe
    "C:\Users\Admin\AppData\Local\Temp\c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NuWWtBZeYqtw.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NuWWtBZeYqtw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD23D.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2500
    • C:\Users\Admin\AppData\Local\Temp\c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6.exe
      "C:\Users\Admin\AppData\Local\Temp\c31ef3e47ebbb92febeeda72abfdbe9b8bb92cca58eda4e607ef2b192d6df1d6.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpD23D.tmp

    Filesize

    1KB

    MD5

    9ea0ec2eb8b5722dfc40d09db0735d2b

    SHA1

    47cb429a0077049d202351a8a5e542382abddcd8

    SHA256

    a8d641886f2816b0a1e686d3e4349eda7c8ee17af27c1466f45186cc296209f9

    SHA512

    820a4d0291163ce2e00ab73a78f7e3870ee30a20e22dff4ab987baaec7754e163bcc8c18bd12df39c5f4a11582d2eac5e3f8ac6fbf3b7358a2b3d8a97ef46af2

  • memory/592-32-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-26-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-28-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-31-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-33-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-34-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-35-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-14-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/592-16-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-22-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-20-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-18-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-24-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-37-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-44-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-38-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-36-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-43-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-42-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-41-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-40-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/592-39-0x0000000000400000-0x0000000000A20000-memory.dmp

    Filesize

    6.1MB

  • memory/2944-45-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2944-2-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2944-3-0x00000000004C0000-0x00000000004D2000-memory.dmp

    Filesize

    72KB

  • memory/2944-1-0x0000000000D90000-0x0000000000FD4000-memory.dmp

    Filesize

    2.3MB

  • memory/2944-6-0x0000000008700000-0x000000000891A000-memory.dmp

    Filesize

    2.1MB

  • memory/2944-5-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2944-4-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2944-0-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB