Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
FedexAWBClearanceInformation_PDF.exe
Resource
win7
Behavioral task
behavioral2
Sample
FedexAWBClearanceInformation_PDF.exe
Resource
win10
General
-
Target
FedexAWBClearanceInformation_PDF.exe
-
Size
792KB
-
MD5
b0829b322fa68301b4d1ddcfa11a60a3
-
SHA1
5fb2b75037ca30d1c22229d0b3a15544ac124e8d
-
SHA256
e1241bc4febe8d5eeb08b49056d73fed437a4e58b84c2e71933fa30625349012
-
SHA512
c438d77cf26a6ccb87f28804707ebe728b4f95e50e0bae7c5e79c020d1cb349acec028f3b80bef6f0d476cff2178410d149a9a8909cf968db9f3b7aeb2ccc0c1
Malware Config
Extracted
asyncrat
0.5.7B
null:null
AsyncMutex_6SI8OkPnk
-
aes_key
1z3fzEgoXZCUsXRTb5n4m2TboyKJnfKi
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
GRACE OVERFLOW
-
host
null
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
https://pastebin.com/raw/Q3bqVVf9
-
port
null
-
version
0.5.7B
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
111aaa
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
resource yara_rule behavioral1/memory/1064-14-0x0000000000400000-0x000000000045B000-memory.dmp family_agenttesla behavioral1/memory/1064-15-0x000000000040104C-mapping.dmp family_agenttesla behavioral1/memory/1064-17-0x0000000000400000-0x000000000045B000-memory.dmp family_agenttesla behavioral1/files/0x00030000000131ad-23.dat family_agenttesla behavioral1/files/0x00030000000131ad-26.dat family_agenttesla behavioral1/files/0x00030000000131ad-27.dat family_agenttesla -
Async RAT payload 9 IoCs
resource yara_rule behavioral1/files/0x00040000000131a9-5.dat asyncrat behavioral1/files/0x00040000000131a9-7.dat asyncrat behavioral1/files/0x00040000000131a9-8.dat asyncrat behavioral1/memory/1064-14-0x0000000000400000-0x000000000045B000-memory.dmp asyncrat behavioral1/memory/1064-15-0x000000000040104C-mapping.dmp asyncrat behavioral1/memory/1064-17-0x0000000000400000-0x000000000045B000-memory.dmp asyncrat behavioral1/files/0x00050000000131ac-20.dat asyncrat behavioral1/files/0x00050000000131ac-22.dat asyncrat behavioral1/files/0x00050000000131ac-25.dat asyncrat -
Executes dropped EXE 4 IoCs
pid Process 540 hzbuild.exe 1064 AddInProcess32.exe 1412 AsyncPbin.exe 1816 net4bin.exe -
Loads dropped DLL 4 IoCs
pid Process 1032 FedexAWBClearanceInformation_PDF.exe 540 hzbuild.exe 1064 AddInProcess32.exe 1064 AddInProcess32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\cxbuild = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\hzbuild.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 1064 540 hzbuild.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1032 FedexAWBClearanceInformation_PDF.exe 1032 FedexAWBClearanceInformation_PDF.exe 1032 FedexAWBClearanceInformation_PDF.exe 540 hzbuild.exe 540 hzbuild.exe 540 hzbuild.exe 1816 net4bin.exe 1816 net4bin.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1032 FedexAWBClearanceInformation_PDF.exe Token: SeDebugPrivilege 540 hzbuild.exe Token: SeDebugPrivilege 1816 net4bin.exe Token: SeDebugPrivilege 1412 AsyncPbin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1064 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1032 wrote to memory of 900 1032 FedexAWBClearanceInformation_PDF.exe 24 PID 1032 wrote to memory of 900 1032 FedexAWBClearanceInformation_PDF.exe 24 PID 1032 wrote to memory of 900 1032 FedexAWBClearanceInformation_PDF.exe 24 PID 1032 wrote to memory of 900 1032 FedexAWBClearanceInformation_PDF.exe 24 PID 900 wrote to memory of 1436 900 cmd.exe 26 PID 900 wrote to memory of 1436 900 cmd.exe 26 PID 900 wrote to memory of 1436 900 cmd.exe 26 PID 900 wrote to memory of 1436 900 cmd.exe 26 PID 1032 wrote to memory of 540 1032 FedexAWBClearanceInformation_PDF.exe 27 PID 1032 wrote to memory of 540 1032 FedexAWBClearanceInformation_PDF.exe 27 PID 1032 wrote to memory of 540 1032 FedexAWBClearanceInformation_PDF.exe 27 PID 1032 wrote to memory of 540 1032 FedexAWBClearanceInformation_PDF.exe 27 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 540 wrote to memory of 1064 540 hzbuild.exe 28 PID 1064 wrote to memory of 1412 1064 AddInProcess32.exe 29 PID 1064 wrote to memory of 1412 1064 AddInProcess32.exe 29 PID 1064 wrote to memory of 1412 1064 AddInProcess32.exe 29 PID 1064 wrote to memory of 1412 1064 AddInProcess32.exe 29 PID 1064 wrote to memory of 1816 1064 AddInProcess32.exe 30 PID 1064 wrote to memory of 1816 1064 AddInProcess32.exe 30 PID 1064 wrote to memory of 1816 1064 AddInProcess32.exe 30 PID 1064 wrote to memory of 1816 1064 AddInProcess32.exe 30 PID 1816 wrote to memory of 1436 1816 net4bin.exe 34 PID 1816 wrote to memory of 1436 1816 net4bin.exe 34 PID 1816 wrote to memory of 1436 1816 net4bin.exe 34 PID 1816 wrote to memory of 1436 1816 net4bin.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\FedexAWBClearanceInformation_PDF.exe"C:\Users\Admin\AppData\Local\Temp\FedexAWBClearanceInformation_PDF.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v cxbuild /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\hzbuild.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v cxbuild /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\hzbuild.exe"3⤵
- Adds Run key to start application
PID:1436
-
-
-
C:\Users\Admin\AppData\Roaming\hzbuild.exe"C:\Users\Admin\AppData\Roaming\hzbuild.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\AsyncPbin.exe"C:\Users\Admin\AppData\Local\Temp\AsyncPbin.exe" 04⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\net4bin.exe"C:\Users\Admin\AppData\Local\Temp\net4bin.exe" 04⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile5⤵PID:1436
-
-
-
-