Analysis

  • max time kernel
    142s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 01:43

General

  • Target

    b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe

  • Size

    359KB

  • MD5

    ab0e0ab3d5709e3831dcaa08b6c8a9db

  • SHA1

    5d8e5e35fe9edd166b13e592fafe08a74b14455c

  • SHA256

    b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1

  • SHA512

    afde3acf5bb8a6be06c182d53daa437ce92a92871f6953b6766fbf51da08cb2f3581c04db1ffc2542cd8d4dcaf4f8cc1c8b732e3027d29c94a39d42b1418a327

  • SSDEEP

    6144:hHadpdwMakhnB4kzYT6BwH50mM44oeRa6I/XP+fYi8QE+qDVDAIBE+1W4Fh95up:hHadykhipH50r4ll/XelURl/z95K

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe
    "C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe
      "C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\App.ini
    Filesize

    75B

    MD5

    2e48b9011ad07414375e2f9d119b8ead

    SHA1

    6d33afcf5d663fe8ac1ea1248e366487f83de813

    SHA256

    37a4395abe94f7bd0c86ba824375af91da2909fa9cb3b06ab4957ed6277eeb2e

    SHA512

    eca86f8e74a95636c3c950c6a61e673799711cc8347cbf515d3f3818decb430843d2f8ca5d1a2f32eee89baf27dd59c77e3030666a8722c4c708a25570391563

  • \Users\Admin\AppData\Local\Temp\nst22BF.tmp\System.dll
    Filesize

    12KB

    MD5

    192639861e3dc2dc5c08bb8f8c7260d5

    SHA1

    58d30e460609e22fa0098bc27d928b689ef9af78

    SHA256

    23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    SHA512

    6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

  • memory/2736-25-0x0000000077210000-0x00000000773B9000-memory.dmp
    Filesize

    1.7MB

  • memory/2736-26-0x0000000000470000-0x00000000014D2000-memory.dmp
    Filesize

    16.4MB

  • memory/2736-29-0x0000000077210000-0x00000000773B9000-memory.dmp
    Filesize

    1.7MB

  • memory/2736-27-0x0000000000470000-0x00000000014D2000-memory.dmp
    Filesize

    16.4MB

  • memory/2736-30-0x0000000000470000-0x00000000004B0000-memory.dmp
    Filesize

    256KB

  • memory/2972-23-0x0000000077211000-0x0000000077312000-memory.dmp
    Filesize

    1.0MB

  • memory/2972-24-0x0000000077210000-0x00000000773B9000-memory.dmp
    Filesize

    1.7MB