Analysis
-
max time kernel
122s -
max time network
117s -
platform
windows10_x64 -
resource
win10 -
submitted
08/07/2020, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
PO345678.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
PO345678.exe
Resource
win10
General
-
Target
PO345678.exe
-
Size
883KB
-
MD5
49176bcb0b146d290d9a02e78b57d4df
-
SHA1
aa04d97bfbe65b9cbce4ffe9488df2f25b3b91e5
-
SHA256
943cfd0d793dc383dfa4672bf1d2b6b67d4e4dd75b3de9fefcbbdf1f33027f8c
-
SHA512
9c3ca652ba81e748e7499934494acce2bbd3f36968423098c71f23223c3ff430c658ac8214ebbd2ac987267e29e3f5997b5f97121511e55ae463e2ccd24ce565
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ikem123456789
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 976 wrote to memory of 3900 976 PO345678.exe 67 PID 976 wrote to memory of 3900 976 PO345678.exe 67 PID 976 wrote to memory of 3900 976 PO345678.exe 67 PID 976 wrote to memory of 3928 976 PO345678.exe 68 PID 976 wrote to memory of 3928 976 PO345678.exe 68 PID 976 wrote to memory of 3928 976 PO345678.exe 68 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 PID 976 wrote to memory of 3948 976 PO345678.exe 69 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 976 PO345678.exe Token: SeDebugPrivilege 3948 PO345678.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 976 PO345678.exe 976 PO345678.exe 976 PO345678.exe 976 PO345678.exe 3948 PO345678.exe 3948 PO345678.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 976 set thread context of 3948 976 PO345678.exe 69 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO345678.exe"C:\Users\Admin\AppData\Local\Temp\PO345678.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:976 -
C:\Users\Admin\AppData\Local\Temp\PO345678.exe"{path}"2⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\PO345678.exe"{path}"2⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\PO345678.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3948
-