Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
invoice.exe
-
Size
790KB
-
MD5
17a7310d17d72b264cbb9f216ebaedc5
-
SHA1
2de56901f9898e71135327620c2618c1fbff6c1c
-
SHA256
7f42d837b15c2f7ef2e2fb062381770bd7913f7f4621fb9bec7bfffbb410b5e3
-
SHA512
73c846fee6dce722d423d854d618c5850e278eadf5b853f7805a512d8a30fe0e4107d4a8f069aff1939306ff3ce259d6643a3e5f1c956fb3c6fb6873e7794622
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
mail.serviciocitroen.com - Port:
587 - Username:
[email protected] - Password:
FXO]%cdB8gx-
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.serviciocitroen.com - Port:
587 - Username:
[email protected] - Password:
FXO]%cdB8gx-
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
resource yara_rule behavioral2/memory/3916-1-0x00000000004A3950-mapping.dmp family_agenttesla behavioral2/memory/3916-3-0x0000000000400000-0x00000000004A5000-memory.dmp family_agenttesla behavioral2/memory/3916-4-0x0000000002150000-0x000000000219C000-memory.dmp family_agenttesla -
resource yara_rule behavioral2/memory/3916-0-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/3916-2-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/3916-3-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 3916 3832 invoice.exe 67 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3832 invoice.exe 3832 invoice.exe 3916 invoice.exe 3916 invoice.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3832 invoice.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 invoice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 3916 3832 invoice.exe 67 PID 3832 wrote to memory of 3916 3832 invoice.exe 67 PID 3832 wrote to memory of 3916 3832 invoice.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-