Analysis
-
max time kernel
105s -
max time network
50s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
16-07-2020 10:09
Static task
static1
Behavioral task
behavioral1
Sample
DST261234.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
DST261234.exe
Resource
win10v200430
General
-
Target
DST261234.exe
-
Size
572KB
-
MD5
a5375147434baba2a3eb32606e9931b5
-
SHA1
aa1ef84f0918adb4682452221772eb6a61c3618b
-
SHA256
24a00145d774f6aac5b11be0188c88f4b9485e626f464e94bb355db0e2ad0f93
-
SHA512
a6f72a783c18f97e3fdaaef23b9634c8b15bf46d8b393cb87490d55de8fbb535724e04904881a98038cca1108c5ccf8b6d1fff32e345e502d9941c29910732c2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.blackpearl-tours.com - Port:
587 - Username:
[email protected] - Password:
black@123instanbul
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/556-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/556-5-0x000000000044756E-mapping.dmp family_agenttesla behavioral1/memory/556-6-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/556-7-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DST261234.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DST261234.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DST261234.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 DST261234.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 824 set thread context of 556 824 DST261234.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 824 DST261234.exe 556 DST261234.exe 556 DST261234.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 824 DST261234.exe Token: SeDebugPrivilege 556 DST261234.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 556 DST261234.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 824 wrote to memory of 1764 824 DST261234.exe 27 PID 824 wrote to memory of 1764 824 DST261234.exe 27 PID 824 wrote to memory of 1764 824 DST261234.exe 27 PID 824 wrote to memory of 1764 824 DST261234.exe 27 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29 PID 824 wrote to memory of 556 824 DST261234.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\DST261234.exe"C:\Users\Admin\AppData\Local\Temp\DST261234.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FfsxUqNaghJe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4B13.tmp"2⤵
- Creates scheduled task(s)
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\DST261234.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:556
-