Analysis
-
max time kernel
96s -
max time network
76s -
platform
windows7_x64 -
resource
win7 -
submitted
09-07-2020 16:16
Static task
static1
Behavioral task
behavioral1
Sample
july9o.exe
Resource
win7
Behavioral task
behavioral2
Sample
july9o.exe
Resource
win10
General
-
Target
july9o.exe
-
Size
610KB
-
MD5
2a22ab4eba2aefb03b467815ea4c6ac5
-
SHA1
58e305aeafba39f4b6b40195e968f47e43461b3d
-
SHA256
69ea320678acca63c52c05f9d51fb2ed84a6e454b0925bdf7d4a40d70f083bdc
-
SHA512
b495020e62a6a65ebfee310e5fef95c168d2bbd7e1e256fc48832b6d4415e33b12c2b56d9a4baf54f8d56703c9e5884e4b212c68fe0fc747f4d98f8ce15ade12
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
general1248
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/368-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/368-5-0x0000000000446FBE-mapping.dmp family_agenttesla behavioral1/memory/368-7-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/368-8-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 368 AddInProcess32.exe -
Loads dropped DLL 1 IoCs
pid Process 1108 july9o.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1108 set thread context of 368 1108 july9o.exe 24 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1108 july9o.exe 1108 july9o.exe 1108 july9o.exe 368 AddInProcess32.exe 368 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1108 july9o.exe Token: SeDebugPrivilege 368 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24 PID 1108 wrote to memory of 368 1108 july9o.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\july9o.exe"C:\Users\Admin\AppData\Local\Temp\july9o.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-