Analysis
-
max time kernel
75s -
max time network
6s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
AgentTesla.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
AgentTesla.exe
Resource
win10
General
-
Target
AgentTesla.exe
-
Size
965KB
-
MD5
10888cbc0356d7ed153c9d646e650b67
-
SHA1
fe0d31a7ee4cae23de596186512c6af1310ead4c
-
SHA256
df6e5a970596d544e6f644924cafadda5a596e2337621ea98829bd36801fa02c
-
SHA512
a64b4b9e5525a6c609d1eac830a25d7d95e3ab9b6c9374130728bbdd8ddd492676cb8bb60d39139aadf18e8f7adf715d222b5596d7df601b8317cda78dc335c9
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00040000000131ab-0.dat acprotect -
AgentTesla Payload 8 IoCs
resource yara_rule behavioral1/memory/832-2-0x00000000005621E0-mapping.dmp family_agenttesla behavioral1/memory/832-4-0x0000000000400000-0x0000000000564000-memory.dmp family_agenttesla behavioral1/memory/832-5-0x0000000001ED0000-0x0000000001F7C000-memory.dmp family_agenttesla behavioral1/memory/832-7-0x0000000000220000-0x00000000002C5000-memory.dmp family_agenttesla behavioral1/memory/984-13-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/984-14-0x0000000000446E4E-mapping.dmp family_agenttesla behavioral1/memory/984-16-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/984-17-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 984 InstallUtil.exe -
resource yara_rule behavioral1/files/0x00040000000131ab-0.dat upx behavioral1/memory/832-1-0x0000000000400000-0x0000000000564000-memory.dmp upx behavioral1/memory/832-3-0x0000000000400000-0x0000000000564000-memory.dmp upx behavioral1/memory/832-4-0x0000000000400000-0x0000000000564000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1100 AgentTesla.exe 832 AgentTesla.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1100 set thread context of 832 1100 AgentTesla.exe 24 PID 832 set thread context of 984 832 AgentTesla.exe 25 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll AgentTesla.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1100 AgentTesla.exe 832 AgentTesla.exe 832 AgentTesla.exe 832 AgentTesla.exe 984 InstallUtil.exe 984 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1100 AgentTesla.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1100 AgentTesla.exe Token: SeDebugPrivilege 832 AgentTesla.exe Token: SeDebugPrivilege 984 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1100 wrote to memory of 832 1100 AgentTesla.exe 24 PID 1100 wrote to memory of 832 1100 AgentTesla.exe 24 PID 1100 wrote to memory of 832 1100 AgentTesla.exe 24 PID 1100 wrote to memory of 832 1100 AgentTesla.exe 24 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25 PID 832 wrote to memory of 984 832 AgentTesla.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\AgentTesla.exe"C:\Users\Admin\AppData\Local\Temp\AgentTesla.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\AgentTesla.exe"C:\Users\Admin\AppData\Local\Temp\AgentTesla.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-