Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 08:00
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7
Behavioral task
behavioral2
Sample
gunzipped.exe
Resource
win10
General
-
Target
gunzipped.exe
-
Size
565KB
-
MD5
d1c3278d317750fbd5a9dcae7de2e27c
-
SHA1
b7815150d40c9caaed7ff338b3f2864b3ade1a2f
-
SHA256
1585d935d47ff234d4b9a71e4f30d0731677d06f430894496c58153011bb90b7
-
SHA512
c1b57af1776c54dd24c1fa8009bef08a79e6e82112985685d6a1fa4a1988783d1ab450c4ba1e13e25ea55d5cc7298b056a05ed7520ea5ed57058b9b47bb78c34
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.elittacop.com - Port:
587 - Username:
[email protected] - Password:
@eaSYuc8
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1780-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1780-3-0x0000000000446FCE-mapping.dmp family_agenttesla behavioral1/memory/1780-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1780-5-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gunzipped.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gunzipped.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum gunzipped.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 gunzipped.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 284 set thread context of 1780 284 gunzipped.exe 25 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 gunzipped.exe 1780 gunzipped.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 gunzipped.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25 PID 284 wrote to memory of 1780 284 gunzipped.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-