Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 01:43

General

  • Target

    b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe

  • Size

    359KB

  • MD5

    ab0e0ab3d5709e3831dcaa08b6c8a9db

  • SHA1

    5d8e5e35fe9edd166b13e592fafe08a74b14455c

  • SHA256

    b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1

  • SHA512

    afde3acf5bb8a6be06c182d53daa437ce92a92871f6953b6766fbf51da08cb2f3581c04db1ffc2542cd8d4dcaf4f8cc1c8b732e3027d29c94a39d42b1418a327

  • SSDEEP

    6144:hHadpdwMakhnB4kzYT6BwH50mM44oeRa6I/XP+fYi8QE+qDVDAIBE+1W4Fh95up:hHadykhipH50r4ll/XelURl/z95K

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe
    "C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe
      "C:\Users\Admin\AppData\Local\Temp\b129237b16973abf537877e13216d3565238ea99b5ddc1b38890c235457c50c1.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\App.ini
    Filesize

    75B

    MD5

    2e48b9011ad07414375e2f9d119b8ead

    SHA1

    6d33afcf5d663fe8ac1ea1248e366487f83de813

    SHA256

    37a4395abe94f7bd0c86ba824375af91da2909fa9cb3b06ab4957ed6277eeb2e

    SHA512

    eca86f8e74a95636c3c950c6a61e673799711cc8347cbf515d3f3818decb430843d2f8ca5d1a2f32eee89baf27dd59c77e3030666a8722c4c708a25570391563

  • C:\Users\Admin\AppData\Local\Temp\nsrB047.tmp\System.dll
    Filesize

    12KB

    MD5

    192639861e3dc2dc5c08bb8f8c7260d5

    SHA1

    58d30e460609e22fa0098bc27d928b689ef9af78

    SHA256

    23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    SHA512

    6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

  • memory/3632-28-0x000000007200E000-0x000000007200F000-memory.dmp
    Filesize

    4KB

  • memory/3632-29-0x0000000000470000-0x00000000004B0000-memory.dmp
    Filesize

    256KB

  • memory/3632-24-0x0000000077758000-0x0000000077759000-memory.dmp
    Filesize

    4KB

  • memory/3632-25-0x0000000077775000-0x0000000077776000-memory.dmp
    Filesize

    4KB

  • memory/3632-27-0x00000000776D1000-0x00000000777F1000-memory.dmp
    Filesize

    1.1MB

  • memory/3632-26-0x0000000000470000-0x00000000016C4000-memory.dmp
    Filesize

    18.3MB

  • memory/3632-40-0x0000000072000000-0x00000000727B0000-memory.dmp
    Filesize

    7.7MB

  • memory/3632-39-0x000000007200E000-0x000000007200F000-memory.dmp
    Filesize

    4KB

  • memory/3632-30-0x00000000387D0000-0x0000000038D74000-memory.dmp
    Filesize

    5.6MB

  • memory/3632-31-0x0000000072000000-0x00000000727B0000-memory.dmp
    Filesize

    7.7MB

  • memory/3632-32-0x0000000038700000-0x0000000038766000-memory.dmp
    Filesize

    408KB

  • memory/3632-34-0x0000000039240000-0x0000000039290000-memory.dmp
    Filesize

    320KB

  • memory/3632-35-0x0000000039290000-0x0000000039322000-memory.dmp
    Filesize

    584KB

  • memory/3632-36-0x0000000039380000-0x000000003938A000-memory.dmp
    Filesize

    40KB

  • memory/5004-23-0x0000000074535000-0x0000000074536000-memory.dmp
    Filesize

    4KB

  • memory/5004-22-0x00000000776D1000-0x00000000777F1000-memory.dmp
    Filesize

    1.1MB