Analysis
-
max time kernel
85s -
max time network
81s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
dokkkkk.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
dokkkkk.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
dokkkkk.exe
-
Size
509KB
-
MD5
113239f43eb0005b30cf539444770cb5
-
SHA1
7221c65fd081f585618902c030cc7b92fa32174f
-
SHA256
812d33de017fe1d0ebfa94216d475e13746496c502287675604ae468f1a71720
-
SHA512
157c985f9bcd268de5f0a013a7376746e2014fca6cdeb91ef0839912f0cd52f59bd17e99a6d84349a2d9676893507086258cdde23ad9bd67be4e8c4377c4af81
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.saamaygroup.com - Port:
587 - Username:
[email protected] - Password:
pawan100
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/756-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/756-3-0x000000000044774E-mapping.dmp family_agenttesla behavioral1/memory/756-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/756-5-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\CpSnJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CpSnJ\\CpSnJ.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 756 1448 dokkkkk.exe 24 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1584 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 756 RegSvcs.exe 756 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 756 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 1448 wrote to memory of 756 1448 dokkkkk.exe 24 PID 756 wrote to memory of 1584 756 RegSvcs.exe 28 PID 756 wrote to memory of 1584 756 RegSvcs.exe 28 PID 756 wrote to memory of 1584 756 RegSvcs.exe 28 PID 756 wrote to memory of 1584 756 RegSvcs.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dokkkkk.exe"C:\Users\Admin\AppData\Local\Temp\dokkkkk.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1584
-
-