Analysis
-
max time kernel
122s -
max time network
117s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 06:22
Static task
static1
Behavioral task
behavioral1
Sample
090000900000000000.exe
Resource
win7
Behavioral task
behavioral2
Sample
090000900000000000.exe
Resource
win10
General
-
Target
090000900000000000.exe
-
Size
333KB
-
MD5
9ea4dbfd0ceab41b5956d1dbda6a0319
-
SHA1
b6a2c2baf9623987e7ac49fa203a1fb2e4d555e1
-
SHA256
34f5833d282f7d896be6f560a66acfe0386ae8aea8a4724debe0b57ec7b74520
-
SHA512
2640d9353c76060694b809845f195637fe70d9f35b1d10fec18c54422a4d9b129b08d84ff125b9e7e96759c426e4c42d938c676665b997331488581f3fbd59f5
Malware Config
Extracted
Protocol: smtp- Host:
mail.petekyazilim.com - Port:
587 - Username:
[email protected] - Password:
petek19721972
Extracted
agenttesla
Protocol: smtp- Host:
mail.petekyazilim.com - Port:
587 - Username:
[email protected] - Password:
petek19721972
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2572-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral2/memory/2572-3-0x00000000004470AE-mapping.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
090000900000000000.exedescription pid process target process PID 3236 set thread context of 2572 3236 090000900000000000.exe 090000900000000000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
090000900000000000.exe090000900000000000.exepid process 3236 090000900000000000.exe 3236 090000900000000000.exe 2572 090000900000000000.exe 2572 090000900000000000.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
090000900000000000.exe090000900000000000.exedescription pid process Token: SeDebugPrivilege 3236 090000900000000000.exe Token: SeDebugPrivilege 2572 090000900000000000.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
090000900000000000.exedescription pid process target process PID 3236 wrote to memory of 3492 3236 090000900000000000.exe schtasks.exe PID 3236 wrote to memory of 3492 3236 090000900000000000.exe schtasks.exe PID 3236 wrote to memory of 3492 3236 090000900000000000.exe schtasks.exe PID 3236 wrote to memory of 3240 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 3240 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 3240 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe PID 3236 wrote to memory of 2572 3236 090000900000000000.exe 090000900000000000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\090000900000000000.exe"C:\Users\Admin\AppData\Local\Temp\090000900000000000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fcsymhsOTqq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp818F.tmp"2⤵
- Creates scheduled task(s)
PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\090000900000000000.exe"{path}"2⤵PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\090000900000000000.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c33b4293a0023b388d1a816aba4901f1
SHA1a793fe7d4694457873aa26a454a5d4b0207d7d54
SHA2565b4a63ea1ce7cc18eb1be775ffb52b342bb678f265c88d4518d8e1fe44a55234
SHA512d04308b55218a71bd09562de76a8030e6327fb0143695e01cb25fb5ad6a9b3715425e4782dc5d27b0aaaf0d71048f0886099df6ce87e29e796abe3727fd1ba53
-
MD5
686ba400ed15a11333ad9b05d9b4b638
SHA15faad217c1990025191ec5db40afa1145eeca0c6
SHA256679951d541cb86476198abdb6ecd8631334fdfc36038b3b7b5cbcf4232d35ce1
SHA5120dad4df01c84c27ca6cb4e07c2ee62cfc8132d94dde567859296cd00dc31478838c017139c4d6a7b1d67c02a8ffb78ea691efa5ed327f1a67797927958f58e73