Analysis
-
max time kernel
143s -
max time network
35s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10-07-2020 07:33
Static task
static1
Behavioral task
behavioral1
Sample
RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe
-
Size
450KB
-
MD5
8f178a002181e9b40cd09e244b61d1c9
-
SHA1
ea47dfa2d70ee217a9a5c4cf19c66c8a65108fc4
-
SHA256
bc3ad77264762f9b266ab641f391bbb456ef4bc5c27f64b884506eeaa84dfe58
-
SHA512
fa15075384a95e57c2077127fbccfc4eeed67d81cf140685c416858a7ca9bc5d310149d0952bf6fbdcfc0db65f7a53d1508edfadd490e69e1333137b5a327d15
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
faith12AB
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1796-2-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla behavioral1/memory/1796-3-0x000000000044CB6E-mapping.dmp family_agenttesla behavioral1/memory/1796-4-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla behavioral1/memory/1796-5-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 828 set thread context of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 1796 MSBuild.exe 1796 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe Token: SeDebugPrivilege 1796 MSBuild.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 828 wrote to memory of 1796 828 RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe 26 PID 1796 wrote to memory of 572 1796 MSBuild.exe 28 PID 1796 wrote to memory of 572 1796 MSBuild.exe 28 PID 1796 wrote to memory of 572 1796 MSBuild.exe 28 PID 1796 wrote to memory of 572 1796 MSBuild.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe"C:\Users\Admin\AppData\Local\Temp\RF_DHL KULI500796821_PO200000035_SCAN DOCS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:572
-
-