Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 01:07

General

  • Target

    25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d.exe

  • Size

    1.4MB

  • MD5

    a1c0e62bfbb50eb16196a79048ea4715

  • SHA1

    c5509baca115876734bf903fc41b5a089a654da9

  • SHA256

    25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d

  • SHA512

    50b2c489dde5e2ef1dfeb239939022556c686a5b55ce3695b53dec4f5dd4a8828cafc6c401a23759de59e194ab2a159cf94f2e7ddefb8f6b609d2e3f57d186b0

  • SSDEEP

    24576:hu7N83iKECVq3qUy4ewfZv1RIAhjLoamMiX4lNmZg0YxegPbUIDPP:hu7N8yKEqqFB1PjLoyEkmZ9Y14

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6033005603:AAFnN3UWkxnurt9KjO1qxD4NTlJRB3IwKuk/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d.exe
    "C:\Users\Admin\AppData\Local\Temp\25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2616
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TZIkDlEJ.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2296
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TZIkDlEJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2DA5.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2196
    • C:\Users\Admin\AppData\Local\Temp\25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d.exe
      "C:\Users\Admin\AppData\Local\Temp\25d3986413dbc6bdae6f4375562fc8282a525be4944d6853dc46413669b80c4d.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp2DA5.tmp

    Filesize

    1KB

    MD5

    93d0cc01e56173dbbb637bfbca8f2315

    SHA1

    212c6c0be13f5cdba3626660ed2d263a1576d10d

    SHA256

    c7a003ef97eea35e62095020bcd1cef7a7a8f0a62cb1ae15a87a5a82659f68c0

    SHA512

    07f58626bd70904157de2de72893ca21afc91956a7636df82e4c30063abe8eb4410ce4608cdb3afe47a920f4457fe4f1341ccf97a80ec4ce570c8e22f53cb0c2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E4TOFAWLXW5U2JO9IWVE.temp

    Filesize

    7KB

    MD5

    4d232c31e6ec9c49d3f4e5128ff0e8f1

    SHA1

    70534db2eb3d238d7ceeb6a20be745a5f3065b65

    SHA256

    2b41bdc1d07cd53f853f030734d9ea91c9be1ec8304b4f1ef34b30060a58b056

    SHA512

    58198b72873b71c2a778ef97de9cfa4030df13981f39f9e4154f86cb119a5fe77a081dd708bbf87976ea91038b4043fe9d333553f592bfa3fb83ed25b4a8c060

  • memory/2572-21-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2572-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2572-23-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2572-30-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2572-25-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2572-31-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2572-32-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2572-27-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2976-5-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2976-20-0x0000000004EC0000-0x0000000004EF2000-memory.dmp

    Filesize

    200KB

  • memory/2976-7-0x0000000005800000-0x000000000586A000-memory.dmp

    Filesize

    424KB

  • memory/2976-6-0x0000000000710000-0x000000000071A000-memory.dmp

    Filesize

    40KB

  • memory/2976-0-0x000000007491E000-0x000000007491F000-memory.dmp

    Filesize

    4KB

  • memory/2976-4-0x000000007491E000-0x000000007491F000-memory.dmp

    Filesize

    4KB

  • memory/2976-3-0x0000000000700000-0x000000000070E000-memory.dmp

    Filesize

    56KB

  • memory/2976-33-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2976-2-0x0000000074910000-0x0000000074FFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2976-1-0x0000000000BF0000-0x0000000000D52000-memory.dmp

    Filesize

    1.4MB