Analysis
-
max time kernel
64s -
max time network
40s -
platform
windows7_x64 -
resource
win7 -
submitted
14-07-2020 14:43
Static task
static1
Behavioral task
behavioral1
Sample
5555555000000000.exe
Resource
win7
General
-
Target
5555555000000000.exe
-
Size
739KB
-
MD5
4dd6e8b706a8b9b1c9d79ae68aa2162a
-
SHA1
ea7b82c7e32ebbaaf52e2a646f33643cba26c189
-
SHA256
7a3c761d105aebdfc06ce56ef43ba47d374ba81cc1d64d5380054cccbd92bd57
-
SHA512
52698478ccca80480d51d7163d3581d366372801ca67978d0233b1f13db158a4d47aa3699727e0f7b65e5b9c3de6d177052beac69d91b4e2e8ec4309e42a079f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sensar-light.com - Port:
587 - Username:
[email protected] - Password:
505012345@@@@@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1108-1-0x00000000004A3B60-mapping.dmp family_agenttesla behavioral1/memory/1108-3-0x0000000000400000-0x00000000004A5000-memory.dmp family_agenttesla behavioral1/memory/1108-4-0x0000000000330000-0x000000000037C000-memory.dmp family_agenttesla behavioral1/memory/1108-6-0x0000000000250000-0x0000000000296000-memory.dmp family_agenttesla -
resource yara_rule behavioral1/memory/1108-0-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/1108-2-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral1/memory/1108-3-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1124 set thread context of 1108 1124 5555555000000000.exe 24 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1124 5555555000000000.exe 1108 5555555000000000.exe 1108 5555555000000000.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1124 5555555000000000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 5555555000000000.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1108 1124 5555555000000000.exe 24 PID 1124 wrote to memory of 1108 1124 5555555000000000.exe 24 PID 1124 wrote to memory of 1108 1124 5555555000000000.exe 24 PID 1124 wrote to memory of 1108 1124 5555555000000000.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"C:\Users\Admin\AppData\Local\Temp\5555555000000000.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-