Analysis
-
max time kernel
126s -
max time network
145s -
platform
windows10_x64 -
resource
win10 -
submitted
11/07/2020, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7
0 signatures
0 seconds
General
-
Target
file.exe
-
Size
467KB
-
MD5
3d40f79b056c758266a6b19856e1ac28
-
SHA1
1444fe76f41e4565415a42be9568845fedd1e694
-
SHA256
c905064bb651ad48f6a67415f4b982254e6f816ff03b1f19d3da32da19a8d788
-
SHA512
1aaa18883749719f34514c9fb0ab3d661e5019a095f33bcfbd0a6e73eea62cc9ae75c0bfe8289e3787ba360c5fb72c962bb150d625a68d30541636fe969bf386
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
mail.flood-protection.org - Port:
587 - Username:
[email protected] - Password:
tj2424@
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.flood-protection.org - Port:
587 - Username:
[email protected] - Password:
tj2424@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
resource yara_rule behavioral2/memory/3916-1-0x00000000004AE050-mapping.dmp family_agenttesla behavioral2/memory/3916-3-0x0000000000400000-0x00000000004B0000-memory.dmp family_agenttesla behavioral2/memory/3916-4-0x00000000021F0000-0x0000000002242000-memory.dmp family_agenttesla -
resource yara_rule behavioral2/memory/3916-0-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral2/memory/3916-2-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral2/memory/3916-3-0x0000000000400000-0x00000000004B0000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 3916 3832 file.exe 67 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3832 file.exe 3832 file.exe 3916 file.exe 3916 file.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3832 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3916 file.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3832 wrote to memory of 3916 3832 file.exe 67 PID 3832 wrote to memory of 3916 3832 file.exe 67 PID 3832 wrote to memory of 3916 3832 file.exe 67 PID 3916 wrote to memory of 3992 3916 file.exe 69 PID 3916 wrote to memory of 3992 3916 file.exe 69 PID 3916 wrote to memory of 3992 3916 file.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:3992
-
-