Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows7_x64 -
resource
win7 -
submitted
14/07/2020, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENTS.exe
Resource
win7
Behavioral task
behavioral2
Sample
DOCUMENTS.exe
Resource
win10v200430
General
-
Target
DOCUMENTS.exe
-
Size
953KB
-
MD5
49a624292ca84737cc6c1318ba79c37f
-
SHA1
22dd3f01d20fda38ef2d9baf892837aba7c4ce30
-
SHA256
f84fb6d4efc2d260e4afc8515a01646621b32a5a8e767d7f0056a3e3f0f9aacb
-
SHA512
4f841d11bfc3f3e334a0929c7e5eae540d91c65d38ba912e127293d4999c1d34f7ee9caf70f6b7419af28a3c555531da9dab111a8aa2604cfc3f352708e80c5b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.varda.com.tr - Port:
587 - Username:
[email protected] - Password:
varda9997929
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1792-4-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1792-5-0x0000000000446E1E-mapping.dmp family_agenttesla behavioral1/memory/1792-6-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1792-7-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\CpSnJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CpSnJ\\CpSnJ.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 1792 1612 DOCUMENTS.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1692 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1080 REG.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1612 DOCUMENTS.exe 1612 DOCUMENTS.exe 1792 RegSvcs.exe 1792 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1612 DOCUMENTS.exe Token: SeDebugPrivilege 1792 RegSvcs.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1692 1612 DOCUMENTS.exe 24 PID 1612 wrote to memory of 1692 1612 DOCUMENTS.exe 24 PID 1612 wrote to memory of 1692 1612 DOCUMENTS.exe 24 PID 1612 wrote to memory of 1692 1612 DOCUMENTS.exe 24 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1780 1612 DOCUMENTS.exe 26 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1612 wrote to memory of 1792 1612 DOCUMENTS.exe 27 PID 1792 wrote to memory of 1080 1792 RegSvcs.exe 31 PID 1792 wrote to memory of 1080 1792 RegSvcs.exe 31 PID 1792 wrote to memory of 1080 1792 RegSvcs.exe 31 PID 1792 wrote to memory of 1080 1792 RegSvcs.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\DOCUMENTS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WeLdCbn" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAF51.tmp"2⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵PID:1780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1080
-
-