Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
14/07/2020, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
5555555000000000.exe
Resource
win7
General
-
Target
5555555000000000.exe
-
Size
739KB
-
MD5
4dd6e8b706a8b9b1c9d79ae68aa2162a
-
SHA1
ea7b82c7e32ebbaaf52e2a646f33643cba26c189
-
SHA256
7a3c761d105aebdfc06ce56ef43ba47d374ba81cc1d64d5380054cccbd92bd57
-
SHA512
52698478ccca80480d51d7163d3581d366372801ca67978d0233b1f13db158a4d47aa3699727e0f7b65e5b9c3de6d177052beac69d91b4e2e8ec4309e42a079f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sensar-light.com - Port:
587 - Username:
[email protected] - Password:
505012345@@@@@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/memory/1276-3-0x0000000000400000-0x00000000004A5000-memory.dmp family_agenttesla behavioral2/memory/1276-4-0x0000000000980000-0x00000000009CC000-memory.dmp family_agenttesla -
resource yara_rule behavioral2/memory/1276-0-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/1276-2-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral2/memory/1276-3-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 664 set thread context of 1276 664 5555555000000000.exe 68 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 664 5555555000000000.exe 664 5555555000000000.exe 1276 5555555000000000.exe 1276 5555555000000000.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 664 5555555000000000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1276 5555555000000000.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 664 wrote to memory of 1276 664 5555555000000000.exe 68 PID 664 wrote to memory of 1276 664 5555555000000000.exe 68 PID 664 wrote to memory of 1276 664 5555555000000000.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-