Analysis
-
max time kernel
90s -
max time network
63s -
platform
windows7_x64 -
resource
win7 -
submitted
10/07/2020, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
E410B98888.exe
Resource
win7
Behavioral task
behavioral2
Sample
E410B98888.exe
Resource
win10v200430
General
-
Target
E410B98888.exe
-
Size
1.7MB
-
MD5
4fb67120185f1f35a4ee966dd8673eb7
-
SHA1
563837b69516b71eaf64d5bcedf014adbbc45f07
-
SHA256
184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
-
SHA512
974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 16 IoCs
resource yara_rule behavioral1/files/0x00030000000131ab-10.dat family_masslogger behavioral1/files/0x00030000000131ab-12.dat family_masslogger behavioral1/files/0x00030000000131ab-13.dat family_masslogger behavioral1/files/0x00030000000131ab-19.dat family_masslogger behavioral1/files/0x00030000000131ab-20.dat family_masslogger behavioral1/files/0x00030000000131ab-21.dat family_masslogger behavioral1/files/0x00030000000131ab-23.dat family_masslogger behavioral1/memory/1572-25-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-26-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-27-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-28-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-29-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-30-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-31-0x0000000000000000-mapping.dmp family_masslogger behavioral1/memory/1572-32-0x0000000000000000-mapping.dmp family_masslogger behavioral1/files/0x00030000000131ab-34.dat family_masslogger -
AgentTesla Payload 12 IoCs
resource yara_rule behavioral1/files/0x00040000000131a7-3.dat family_agenttesla behavioral1/files/0x00040000000131a7-4.dat family_agenttesla behavioral1/files/0x00040000000131a7-6.dat family_agenttesla behavioral1/files/0x00040000000131a7-7.dat family_agenttesla behavioral1/memory/1572-25-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-26-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-27-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-28-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-29-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-30-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-31-0x0000000000000000-mapping.dmp family_agenttesla behavioral1/memory/1572-32-0x0000000000000000-mapping.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 1496 wiseman.exe 1572 .exe -
Loads dropped DLL 8 IoCs
pid Process 1088 E410B98888.exe 1088 E410B98888.exe 1088 E410B98888.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 320 1572 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1088 E410B98888.exe 1496 wiseman.exe 1496 wiseman.exe 1088 E410B98888.exe 1088 E410B98888.exe 1572 .exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1088 E410B98888.exe Token: SeDebugPrivilege 1496 wiseman.exe Token: SeDebugPrivilege 1572 .exe Token: SeDebugPrivilege 320 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 wiseman.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1496 1088 E410B98888.exe 24 PID 1088 wrote to memory of 1496 1088 E410B98888.exe 24 PID 1088 wrote to memory of 1496 1088 E410B98888.exe 24 PID 1088 wrote to memory of 1496 1088 E410B98888.exe 24 PID 1088 wrote to memory of 540 1088 E410B98888.exe 25 PID 1088 wrote to memory of 540 1088 E410B98888.exe 25 PID 1088 wrote to memory of 540 1088 E410B98888.exe 25 PID 1088 wrote to memory of 540 1088 E410B98888.exe 25 PID 540 wrote to memory of 1028 540 cmd.exe 27 PID 540 wrote to memory of 1028 540 cmd.exe 27 PID 540 wrote to memory of 1028 540 cmd.exe 27 PID 540 wrote to memory of 1028 540 cmd.exe 27 PID 1088 wrote to memory of 1572 1088 E410B98888.exe 31 PID 1088 wrote to memory of 1572 1088 E410B98888.exe 31 PID 1088 wrote to memory of 1572 1088 E410B98888.exe 31 PID 1088 wrote to memory of 1572 1088 E410B98888.exe 31 PID 1572 wrote to memory of 320 1572 .exe 34 PID 1572 wrote to memory of 320 1572 .exe 34 PID 1572 wrote to memory of 320 1572 .exe 34 PID 1572 wrote to memory of 320 1572 .exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\E410B98888.exe"C:\Users\Admin\AppData\Local\Temp\E410B98888.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\Desktop\wiseman.exe"C:\Users\Admin\Desktop\wiseman.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:1028
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 7323⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-