Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 06:57
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.exe
Resource
win7
General
-
Target
Payment Confirmation.exe
-
Size
802KB
-
MD5
eab784731e9e99ee215c2741651d1b92
-
SHA1
691773b52b53a555d09378e02d38bf710c045204
-
SHA256
3cccff9a1654ffd65017b4264a450e2c1198275dd84050139794488778bd7961
-
SHA512
83130d6dfe9cba9b415601c8d50606f807ff1c2e2b8761bf6c3279e4cd14472e2776e1e68fa83b474e45e076cc14a7acc60202e91791acb4d6d540ee0c5d0173
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Blessing123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/memory/1740-3-0x0000000000400000-0x00000000004A4000-memory.dmp family_agenttesla behavioral2/memory/1740-4-0x0000000002180000-0x00000000021CC000-memory.dmp family_agenttesla -
resource yara_rule behavioral2/memory/1740-0-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/1740-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/1740-3-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 1740 1628 Payment Confirmation.exe 68 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 Payment Confirmation.exe 1628 Payment Confirmation.exe 1740 Payment Confirmation.exe 1740 Payment Confirmation.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1628 Payment Confirmation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 Payment Confirmation.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1740 1628 Payment Confirmation.exe 68 PID 1628 wrote to memory of 1740 1628 Payment Confirmation.exe 68 PID 1628 wrote to memory of 1740 1628 Payment Confirmation.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-