Analysis
-
max time kernel
69s -
max time network
143s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents P.LIST &Bill of Laden.exe
Resource
win7
General
-
Target
Shipping Documents P.LIST &Bill of Laden.exe
-
Size
444KB
-
MD5
71f0228d2efec9fdfa5924238877631b
-
SHA1
88798dab1ba2e06b8860c3c927687ebc86440433
-
SHA256
135c264ce4a709eedd0f971cec5eebb546c9c31e84730793fec5552a6886f7c9
-
SHA512
18ec4731a99674df616d07adb11530a91902d18c90389c4a5776a1248a61298ee11ec4c2fe17118d084fb9a18f081bdcea3a3930ed87ea94f39eb84a9587b949
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.radianthospitals.org - Port:
587 - Username:
[email protected] - Password:
radiant2016
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
resource yara_rule behavioral2/memory/3936-1-0x00000000004A2690-mapping.dmp family_agenttesla behavioral2/memory/3936-3-0x0000000000400000-0x00000000004A4000-memory.dmp family_agenttesla behavioral2/memory/3936-4-0x00000000009C0000-0x0000000000A0C000-memory.dmp family_agenttesla -
resource yara_rule behavioral2/memory/3936-0-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/3936-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/3936-3-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3100 set thread context of 3936 3100 Shipping Documents P.LIST &Bill of Laden.exe 67 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3100 Shipping Documents P.LIST &Bill of Laden.exe 3100 Shipping Documents P.LIST &Bill of Laden.exe 3936 Shipping Documents P.LIST &Bill of Laden.exe 3936 Shipping Documents P.LIST &Bill of Laden.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3100 Shipping Documents P.LIST &Bill of Laden.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3936 Shipping Documents P.LIST &Bill of Laden.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 3936 3100 Shipping Documents P.LIST &Bill of Laden.exe 67 PID 3100 wrote to memory of 3936 3100 Shipping Documents P.LIST &Bill of Laden.exe 67 PID 3100 wrote to memory of 3936 3100 Shipping Documents P.LIST &Bill of Laden.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents P.LIST &Bill of Laden.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents P.LIST &Bill of Laden.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents P.LIST &Bill of Laden.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents P.LIST &Bill of Laden.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-