Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 18:34
Static task
static1
Behavioral task
behavioral1
Sample
885b6003eb683aeccb927d2a9bc82b3c.exe
Resource
win7
Behavioral task
behavioral2
Sample
885b6003eb683aeccb927d2a9bc82b3c.exe
Resource
win10
General
-
Target
885b6003eb683aeccb927d2a9bc82b3c.exe
-
Size
543KB
-
MD5
885b6003eb683aeccb927d2a9bc82b3c
-
SHA1
c6d26dd4ae0edccd52a6afa7bb48239fb1f607b8
-
SHA256
751dffc7391890afbcb40a55e29bd319d8b4a9e2e0438c5f5939ac09ab6ae297
-
SHA512
2b03ef553cc2ac38d118346ab5a2f0f2abd49c06ade5b2fcfba95d10ebd77801bdb65fe53a2ceac281cccb3d83de4cc7f7d912cc6ca129b10412b19cfc603510
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
bh-58.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1620-0-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1620-1-0x0000000000446D5E-mapping.dmp family_agenttesla behavioral1/memory/1620-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1620-3-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\prosper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\prosper\\prosper.exe" 885b6003eb683aeccb927d2a9bc82b3c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1620 885b6003eb683aeccb927d2a9bc82b3c.exe 1620 885b6003eb683aeccb927d2a9bc82b3c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 885b6003eb683aeccb927d2a9bc82b3c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1620 885b6003eb683aeccb927d2a9bc82b3c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24 PID 316 wrote to memory of 1620 316 885b6003eb683aeccb927d2a9bc82b3c.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\885b6003eb683aeccb927d2a9bc82b3c.exe"C:\Users\Admin\AppData\Local\Temp\885b6003eb683aeccb927d2a9bc82b3c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\885b6003eb683aeccb927d2a9bc82b3c.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1620
-