Analysis
-
max time kernel
84s -
max time network
73s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 16:58
Static task
static1
Behavioral task
behavioral1
Sample
wnrCLqWI1j9.exe
Resource
win7
Behavioral task
behavioral2
Sample
wnrCLqWI1j9.exe
Resource
win10v200430
General
-
Target
wnrCLqWI1j9.exe
-
Size
648KB
-
MD5
62c080a8e9a46c40827ccf560a7ff489
-
SHA1
7e0ca441df2adbd4fcd8250033de92688e1f414a
-
SHA256
160e88f42b6a24d4a995142e7e6288f44bf85fbf1afcc0dd9ff4931bd9bc82f2
-
SHA512
cd1553ec064db5dbe3e6621cb846e369ee9f873b348205cd5ea418d3350935c79b2a471b6897b4f7511ffa373f5de454a2fdf4ef68b1a42c17265f2d2439633d
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.skibokshotell.no/ - Port:
21 - Username:
[email protected] - Password:
DUcDxxNTn3@248
Protocol: ftp- Host:
ftp://ftp.skibokshotell.no/ - Port:
21 - Username:
[email protected] - Password:
DUcDxxNTn3@248
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1104-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1104-3-0x000000000044763E-mapping.dmp family_agenttesla behavioral1/memory/1104-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1104-5-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
wnrCLqWI1j9.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts wnrCLqWI1j9.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
wnrCLqWI1j9.exedescription pid process target process PID 1492 set thread context of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
wnrCLqWI1j9.exepid process 1104 wnrCLqWI1j9.exe 1104 wnrCLqWI1j9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wnrCLqWI1j9.exedescription pid process Token: SeDebugPrivilege 1104 wnrCLqWI1j9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wnrCLqWI1j9.exepid process 1104 wnrCLqWI1j9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
wnrCLqWI1j9.exedescription pid process target process PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe PID 1492 wrote to memory of 1104 1492 wnrCLqWI1j9.exe wnrCLqWI1j9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wnrCLqWI1j9.exe"C:\Users\Admin\AppData\Local\Temp\wnrCLqWI1j9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\wnrCLqWI1j9.exe"{path}"2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1104