Analysis
-
max time kernel
109s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08-07-2020 06:43
Static task
static1
Behavioral task
behavioral1
Sample
Image copy of artwork.img.exe
Resource
win7
Behavioral task
behavioral2
Sample
Image copy of artwork.img.exe
Resource
win10v200430
General
-
Target
Image copy of artwork.img.exe
-
Size
711KB
-
MD5
07070af0e25eacd24d4de3e8e5e25263
-
SHA1
25747b49de7a26de9cc9910f36f0a9f8e729728e
-
SHA256
e83175d7d56084e7dde32b39f8d113f91ee1834890222dde4f987236a88b4165
-
SHA512
b453bbebd3015ba558d65fa47c631c61e37f5fba76f53e0aa9baf9b505d0d663eebe48238cc64f9ff24c4b75f0dd48902ca39b3b58108aa4b9c3d9d15b43b448
Malware Config
Extracted
Protocol: smtp- Host:
evawater.xyz - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
evawater.xyz - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/memory/2572-3-0x0000000000400000-0x00000000004A4000-memory.dmp family_agenttesla behavioral2/memory/2572-4-0x0000000002180000-0x00000000021CC000-memory.dmp family_agenttesla -
resource yara_rule behavioral2/memory/2572-0-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/2572-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/2572-3-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\donstan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\donstan\\donstan.exe" Image copy of artwork.img.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2144 set thread context of 2572 2144 Image copy of artwork.img.exe 68 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2144 Image copy of artwork.img.exe 2144 Image copy of artwork.img.exe 2572 Image copy of artwork.img.exe 2572 Image copy of artwork.img.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2144 Image copy of artwork.img.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2572 Image copy of artwork.img.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2572 2144 Image copy of artwork.img.exe 68 PID 2144 wrote to memory of 2572 2144 Image copy of artwork.img.exe 68 PID 2144 wrote to memory of 2572 2144 Image copy of artwork.img.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\Image copy of artwork.img.exe"C:\Users\Admin\AppData\Local\Temp\Image copy of artwork.img.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Image copy of artwork.img.exe"C:\Users\Admin\AppData\Local\Temp\Image copy of artwork.img.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-