Analysis
-
max time kernel
108s -
max time network
73s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
DHL001173980920PDF.exe
Resource
win7
Behavioral task
behavioral2
Sample
DHL001173980920PDF.exe
Resource
win10
General
-
Target
DHL001173980920PDF.exe
-
Size
780KB
-
MD5
e1ddbcd4db2d987719357e468c46a469
-
SHA1
1d001797a1018683b79c898d73aa0158f08feea5
-
SHA256
e2d112bd0fd186acce6eebc6ec5d389c69fd6ae1154d0f44938de68dedec29cc
-
SHA512
d6aa3da3c9f02bd5006eeb6a86d1ffed5d3500156d8dfa8cd310e12df9a849874a6208f8e710a63467c7ad4f7ab1b5fb5cd21fdb0c69431af784e497a4b453ad
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solarcenter.ro/ - Port:
21 - Username:
[email protected] - Password:
RSv%AL{k~wATNN@ossyguru@00998877
Protocol: ftp- Host:
ftp://ftp.solarcenter.ro/ - Port:
21 - Username:
[email protected] - Password:
RSv%AL{k~wATNN@ossyguru@00998877
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1028-4-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla behavioral1/memory/1028-5-0x000000000044C87E-mapping.dmp family_agenttesla behavioral1/memory/1028-7-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla behavioral1/memory/1028-8-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 1028 RegAsm.exe -
Loads dropped DLL 2 IoCs
pid Process 1544 DHL001173980920PDF.exe 1028 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1544 set thread context of 1028 1544 DHL001173980920PDF.exe 24 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1544 DHL001173980920PDF.exe 1544 DHL001173980920PDF.exe 1544 DHL001173980920PDF.exe 1028 RegAsm.exe 1028 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1544 DHL001173980920PDF.exe Token: SeDebugPrivilege 1028 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1544 wrote to memory of 1028 1544 DHL001173980920PDF.exe 24 PID 1028 wrote to memory of 1940 1028 RegAsm.exe 28 PID 1028 wrote to memory of 1940 1028 RegAsm.exe 28 PID 1028 wrote to memory of 1940 1028 RegAsm.exe 28 PID 1028 wrote to memory of 1940 1028 RegAsm.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL001173980920PDF.exe"C:\Users\Admin\AppData\Local\Temp\DHL001173980920PDF.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1940
-
-