Analysis
-
max time kernel
104s -
max time network
53s -
platform
windows7_x64 -
resource
win7 -
submitted
17/07/2020, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SWIFT.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SWIFT.exe
-
Size
708KB
-
MD5
6b8091a3446c4794afe76977c38e91fa
-
SHA1
ee78f43f53f4b4dc63e8a1ae246a2bfe91b19e98
-
SHA256
b676494a4538d77ebd0d61fac6e6b2609201f46c9c63fd817990b48b8031bb71
-
SHA512
4e076e7b79660bc80275b7613494afe340aee1189a2d65f6c5c9eade902f89d820823a6c60a352ee3dbf4a9bac00c52c40894ab9e17dbb974d5388d0a027d2af
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1816-4-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1816-5-0x00000000004472EE-mapping.dmp family_agenttesla behavioral1/memory/1816-6-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1816-7-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\sLbGMVN = "C:\\Users\\Admin\\AppData\\Roaming\\sLbGMVN\\sLbGMVN.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1144 set thread context of 1816 1144 SWIFT.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1876 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1816 RegSvcs.exe 1816 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1784 1144 SWIFT.exe 26 PID 1144 wrote to memory of 1784 1144 SWIFT.exe 26 PID 1144 wrote to memory of 1784 1144 SWIFT.exe 26 PID 1144 wrote to memory of 1784 1144 SWIFT.exe 26 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1144 wrote to memory of 1816 1144 SWIFT.exe 28 PID 1816 wrote to memory of 1876 1816 RegSvcs.exe 30 PID 1816 wrote to memory of 1876 1816 RegSvcs.exe 30 PID 1816 wrote to memory of 1876 1816 RegSvcs.exe 30 PID 1816 wrote to memory of 1876 1816 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nGADTNiT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF160.tmp"2⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1876
-
-