Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
PO 321134.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
PO 321134.exe
Resource
win10
General
-
Target
PO 321134.exe
-
Size
1.1MB
-
MD5
7b2934d2e00efcb5d5dd7ea10c29da17
-
SHA1
710fd63edc49f1d74a714398674400254b76574e
-
SHA256
abf8160dd66f87903ba311f77da9f6b5c66538ffd5eedc9555a46369a6917b27
-
SHA512
1f543a60f91238b97133794dec53d447e1f66952aecab6e754d45bae637412d9eaf2fe38f09dd1efe09f562ee31a46eebb6500775203ae98d5216b07ab94d6ed
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mail.com - Port:
587 - Username:
[email protected] - Password:
UCHE123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 26 IoCs
resource yara_rule behavioral2/memory/3000-5-0x0000000000F00000-0x00000000015DF000-memory.dmp family_agenttesla behavioral2/memory/3000-6-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-10-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-11-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-12-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-13-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-14-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-15-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-17-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-16-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-18-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-19-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-20-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-21-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-139-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-140-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-141-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-142-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-143-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-144-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-145-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-146-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-147-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-148-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-149-0x0000000000F4D54E-mapping.dmp family_agenttesla behavioral2/memory/3000-150-0x0000000000F4D54E-mapping.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 3600 ngeih.pif 3000 RegSvcs.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ngeih.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\file.exe = "c:\\16437174\\ngeih.pif c:\\16437174\\apgxijq.tun" ngeih.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3600 set thread context of 3000 3600 ngeih.pif 69 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3892 3000 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3000 RegSvcs.exe 3000 RegSvcs.exe 3000 RegSvcs.exe 3000 RegSvcs.exe 3000 RegSvcs.exe 3000 RegSvcs.exe 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif 3600 ngeih.pif -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3000 RegSvcs.exe Token: SeRestorePrivilege 3892 WerFault.exe Token: SeBackupPrivilege 3892 WerFault.exe Token: SeDebugPrivilege 3892 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3600 3100 PO 321134.exe 67 PID 3100 wrote to memory of 3600 3100 PO 321134.exe 67 PID 3100 wrote to memory of 3600 3100 PO 321134.exe 67 PID 3600 wrote to memory of 3000 3600 ngeih.pif 69 PID 3600 wrote to memory of 3000 3600 ngeih.pif 69 PID 3600 wrote to memory of 3000 3600 ngeih.pif 69 PID 3600 wrote to memory of 3000 3600 ngeih.pif 69 PID 3600 wrote to memory of 3000 3600 ngeih.pif 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 321134.exe"C:\Users\Admin\AppData\Local\Temp\PO 321134.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\16437174\ngeih.pif"C:\16437174\ngeih.pif" apgxijq.tun2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 14484⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
-