Analysis
-
max time kernel
57s -
max time network
27s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
invoice.exe
-
Size
790KB
-
MD5
17a7310d17d72b264cbb9f216ebaedc5
-
SHA1
2de56901f9898e71135327620c2618c1fbff6c1c
-
SHA256
7f42d837b15c2f7ef2e2fb062381770bd7913f7f4621fb9bec7bfffbb410b5e3
-
SHA512
73c846fee6dce722d423d854d618c5850e278eadf5b853f7805a512d8a30fe0e4107d4a8f069aff1939306ff3ce259d6643a3e5f1c956fb3c6fb6873e7794622
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.serviciocitroen.com - Port:
587 - Username:
[email protected] - Password:
FXO]%cdB8gx-
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
resource yara_rule behavioral1/memory/1488-3-0x0000000000400000-0x00000000004A5000-memory.dmp family_agenttesla behavioral1/memory/1488-4-0x0000000001C80000-0x0000000001CCC000-memory.dmp family_agenttesla behavioral1/memory/1488-6-0x00000000004B0000-0x00000000004F6000-memory.dmp family_agenttesla -
resource yara_rule behavioral1/memory/1488-0-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/1488-2-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/1488-3-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 1488 1456 invoice.exe 24 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1456 invoice.exe 1488 invoice.exe 1488 invoice.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1456 invoice.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1488 invoice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1488 1456 invoice.exe 24 PID 1456 wrote to memory of 1488 1456 invoice.exe 24 PID 1456 wrote to memory of 1488 1456 invoice.exe 24 PID 1456 wrote to memory of 1488 1456 invoice.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-