Analysis
-
max time kernel
138s -
max time network
32s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07-07-2020 12:46
Static task
static1
Behavioral task
behavioral1
Sample
DHL EXPRESS 564564645.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
DHL EXPRESS 564564645.exe
Resource
win10
General
-
Target
DHL EXPRESS 564564645.exe
-
Size
545KB
-
MD5
0f240b1072934b92345811361b27a433
-
SHA1
f4f16b64065c0d5bc7520f4a6774fce41470890a
-
SHA256
045c21403bfa813b3d1d9758a3388affa4c8b9d0f665470c366c937fafaa64b1
-
SHA512
4f6defa37b84decdeceacf4a2501aa78289103c205fa237b63482e3b93b333b69dd9e37f6af7a7a7898905e01b1a713868ccd766a4549afcdf3ba3fc52a55261
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
DHL EXPRESS 564564645.exedescription pid process target process PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe PID 1400 wrote to memory of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DHL EXPRESS 564564645.exedescription pid process target process PID 1400 set thread context of 1772 1400 DHL EXPRESS 564564645.exe DHL EXPRESS 564564645.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
DHL EXPRESS 564564645.exedescription pid process Token: SeDebugPrivilege 1772 DHL EXPRESS 564564645.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DHL EXPRESS 564564645.exepid process 1772 DHL EXPRESS 564564645.exe 1772 DHL EXPRESS 564564645.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS 564564645.exe"C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS 564564645.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS 564564645.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1772