Analysis
-
max time kernel
93s -
max time network
77s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 06:51
Static task
static1
Behavioral task
behavioral1
Sample
8100OJ.exe
Resource
win7
Behavioral task
behavioral2
Sample
8100OJ.exe
Resource
win10v200430
General
-
Target
8100OJ.exe
-
Size
1.7MB
-
MD5
bfbdaa4f58a5fb04b5ebd07df65d794c
-
SHA1
626c24e885bca21d7da4f74aabb55e1e6b737a76
-
SHA256
04c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
-
SHA512
5793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 16 IoCs
resource yara_rule behavioral1/files/0x00030000000131ab-10.dat family_masslogger behavioral1/files/0x00030000000131ab-12.dat family_masslogger behavioral1/files/0x00030000000131ab-13.dat family_masslogger behavioral1/files/0x00030000000131ab-19.dat family_masslogger behavioral1/files/0x00030000000131ab-21.dat family_masslogger behavioral1/files/0x00030000000131ab-23.dat family_masslogger behavioral1/files/0x00030000000131ab-24.dat family_masslogger behavioral1/memory/1608-26-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-25-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-27-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-28-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-30-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-29-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-31-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1608-32-0x0000000000000000-mapping.dmp family_masslogger behavioral1/files/0x00030000000131ab-34.dat family_masslogger -
AgentTesla Payload 12 IoCs
resource yara_rule behavioral1/files/0x00040000000131a7-3.dat family_agenttesla behavioral1/files/0x00040000000131a7-4.dat family_agenttesla behavioral1/files/0x00040000000131a7-6.dat family_agenttesla behavioral1/files/0x00040000000131a7-7.dat family_agenttesla behavioral1/memory/1608-26-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-25-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-27-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-28-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-30-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-29-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-31-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1608-32-0x0000000000000000-mapping.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 1512 wiseman.exe 1608 .exe -
Loads dropped DLL 8 IoCs
pid Process 1124 8100OJ.exe 1124 8100OJ.exe 1124 8100OJ.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 524 1608 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1124 8100OJ.exe 1512 wiseman.exe 1512 wiseman.exe 1124 8100OJ.exe 1124 8100OJ.exe 1608 .exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe 524 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1124 8100OJ.exe Token: SeDebugPrivilege 1512 wiseman.exe Token: SeDebugPrivilege 1608 .exe Token: SeDebugPrivilege 524 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1512 wiseman.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1512 1124 8100OJ.exe 24 PID 1124 wrote to memory of 1512 1124 8100OJ.exe 24 PID 1124 wrote to memory of 1512 1124 8100OJ.exe 24 PID 1124 wrote to memory of 1512 1124 8100OJ.exe 24 PID 1124 wrote to memory of 596 1124 8100OJ.exe 25 PID 1124 wrote to memory of 596 1124 8100OJ.exe 25 PID 1124 wrote to memory of 596 1124 8100OJ.exe 25 PID 1124 wrote to memory of 596 1124 8100OJ.exe 25 PID 596 wrote to memory of 1116 596 cmd.exe 27 PID 596 wrote to memory of 1116 596 cmd.exe 27 PID 596 wrote to memory of 1116 596 cmd.exe 27 PID 596 wrote to memory of 1116 596 cmd.exe 27 PID 1124 wrote to memory of 1608 1124 8100OJ.exe 31 PID 1124 wrote to memory of 1608 1124 8100OJ.exe 31 PID 1124 wrote to memory of 1608 1124 8100OJ.exe 31 PID 1124 wrote to memory of 1608 1124 8100OJ.exe 31 PID 1608 wrote to memory of 524 1608 .exe 34 PID 1608 wrote to memory of 524 1608 .exe 34 PID 1608 wrote to memory of 524 1608 .exe 34 PID 1608 wrote to memory of 524 1608 .exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8100OJ.exe"C:\Users\Admin\AppData\Local\Temp\8100OJ.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\Desktop\wiseman.exe"C:\Users\Admin\Desktop\wiseman.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:1116
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 7323⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-