Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
Facturas Pagadas al Vencimiento 2.bat.exe
Resource
win7
Behavioral task
behavioral2
Sample
Facturas Pagadas al Vencimiento 2.bat.exe
Resource
win10
General
-
Target
Facturas Pagadas al Vencimiento 2.bat.exe
-
Size
508KB
-
MD5
93873ad64ae56bcd5eb73cf3f5495c39
-
SHA1
af6f2ea498166aae38a363c87e9af905b19ccb59
-
SHA256
a6e37f96da16a4f2be724e41fb5aa0ddcb75ba281b2dcf2077779592ab0ed5bb
-
SHA512
21253a63dc8788a841effcecb445930e811974e26e01b4bb490905cc5e8066dd2f41307b6674a94788971337d615b3e05feebbfab0b5528b117e171425416d96
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.imacdeveracruz.com - Port:
587 - Username:
[email protected] - Password:
Nal02ti*
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1044-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1044-3-0x000000000044788E-mapping.dmp family_agenttesla behavioral1/memory/1044-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1044-5-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1496 set thread context of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1496 Facturas Pagadas al Vencimiento 2.bat.exe 1496 Facturas Pagadas al Vencimiento 2.bat.exe 1044 Facturas Pagadas al Vencimiento 2.bat.exe 1044 Facturas Pagadas al Vencimiento 2.bat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1496 Facturas Pagadas al Vencimiento 2.bat.exe Token: SeDebugPrivilege 1044 Facturas Pagadas al Vencimiento 2.bat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 Facturas Pagadas al Vencimiento 2.bat.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1496 wrote to memory of 736 1496 Facturas Pagadas al Vencimiento 2.bat.exe 24 PID 1496 wrote to memory of 736 1496 Facturas Pagadas al Vencimiento 2.bat.exe 24 PID 1496 wrote to memory of 736 1496 Facturas Pagadas al Vencimiento 2.bat.exe 24 PID 1496 wrote to memory of 736 1496 Facturas Pagadas al Vencimiento 2.bat.exe 24 PID 1496 wrote to memory of 324 1496 Facturas Pagadas al Vencimiento 2.bat.exe 25 PID 1496 wrote to memory of 324 1496 Facturas Pagadas al Vencimiento 2.bat.exe 25 PID 1496 wrote to memory of 324 1496 Facturas Pagadas al Vencimiento 2.bat.exe 25 PID 1496 wrote to memory of 324 1496 Facturas Pagadas al Vencimiento 2.bat.exe 25 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26 PID 1496 wrote to memory of 1044 1496 Facturas Pagadas al Vencimiento 2.bat.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas al Vencimiento 2.bat.exe"C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas al Vencimiento 2.bat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas al Vencimiento 2.bat.exe"{path}"2⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas al Vencimiento 2.bat.exe"{path}"2⤵PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\Facturas Pagadas al Vencimiento 2.bat.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1044
-