Analysis
-
max time kernel
138s -
max time network
32s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
16-07-2020 03:11
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
PO.exe
-
Size
1.3MB
-
MD5
911cfe476937e7f4aad553bc0814e802
-
SHA1
0e8b839716a75991db3f26c5c768059f1aaff27e
-
SHA256
b65f542c74ced21ba853b4840f0cfad311027e518b1c3925bd530a2da424293c
-
SHA512
024749dbe0672625ced0f2e9b2039ba20d4b6f9ef4d5342678773b309e340f93769f081962fece7b2eed4774b0e1869801e0e773a353949c073a89b1d28da1ad
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.israelagroconsultant.com - Port:
587 - Username:
[email protected] - Password:
israelagro@123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1748-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1748-5-0x00000000004473EE-mapping.dmp family_agenttesla behavioral1/memory/1748-6-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1748-7-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\TkvuX = "C:\\Users\\Admin\\AppData\\Roaming\\TkvuX\\TkvuX.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 1748 1400 PO.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1828 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1544 REG.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1400 PO.exe 1748 RegSvcs.exe 1748 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1400 PO.exe Token: SeDebugPrivilege 1748 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1828 1400 PO.exe 26 PID 1400 wrote to memory of 1828 1400 PO.exe 26 PID 1400 wrote to memory of 1828 1400 PO.exe 26 PID 1400 wrote to memory of 1828 1400 PO.exe 26 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1400 wrote to memory of 1748 1400 PO.exe 28 PID 1748 wrote to memory of 1544 1748 RegSvcs.exe 30 PID 1748 wrote to memory of 1544 1748 RegSvcs.exe 30 PID 1748 wrote to memory of 1544 1748 RegSvcs.exe 30 PID 1748 wrote to memory of 1544 1748 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zQklBRQkb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9B16.tmp"2⤵
- Creates scheduled task(s)
PID:1828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1544
-
-