Analysis
-
max time kernel
137s -
max time network
31s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13-07-2020 11:22
Static task
static1
Behavioral task
behavioral1
Sample
32027444.jpg.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
32027444.jpg.exe
Resource
win10
General
-
Target
32027444.jpg.exe
-
Size
340KB
-
MD5
b5552041f02602b6fa8faa9ccd590ea2
-
SHA1
21e742f91ab44673f5cc14b82c18f359a127c670
-
SHA256
3b13bf8c3de862a6914cf5a9eb0539e0046faf3e62e7d2f0fb63001e8dd2b5a3
-
SHA512
124867cbf5d87fc077ed2537f71f47311064ab64558bf5dac59e27acc8ef3e7f372cf307e90da313ebb8864d246f418f9e45efeefd11a5bd945501ffd0558e9f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
HYF76io83%$6
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1872-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1872-5-0x0000000000446DEE-mapping.dmp family_agenttesla behavioral1/memory/1872-6-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1872-7-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 1872 1032 32027444.jpg.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1032 32027444.jpg.exe 1872 32027444.jpg.exe 1872 32027444.jpg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 32027444.jpg.exe Token: SeDebugPrivilege 1872 32027444.jpg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1872 32027444.jpg.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1840 1032 32027444.jpg.exe 26 PID 1032 wrote to memory of 1840 1032 32027444.jpg.exe 26 PID 1032 wrote to memory of 1840 1032 32027444.jpg.exe 26 PID 1032 wrote to memory of 1840 1032 32027444.jpg.exe 26 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28 PID 1032 wrote to memory of 1872 1032 32027444.jpg.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\32027444.jpg.exe"C:\Users\Admin\AppData\Local\Temp\32027444.jpg.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yAlFQicnZjN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4CB8.tmp"2⤵
- Creates scheduled task(s)
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\32027444.jpg.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1872
-