Analysis
-
max time kernel
129s -
max time network
23s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
17-07-2020 13:27
Static task
static1
Behavioral task
behavioral1
Sample
DOC.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DOC.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
DOC.exe
-
Size
708KB
-
MD5
6b8091a3446c4794afe76977c38e91fa
-
SHA1
ee78f43f53f4b4dc63e8a1ae246a2bfe91b19e98
-
SHA256
b676494a4538d77ebd0d61fac6e6b2609201f46c9c63fd817990b48b8031bb71
-
SHA512
4e076e7b79660bc80275b7613494afe340aee1189a2d65f6c5c9eade902f89d820823a6c60a352ee3dbf4a9bac00c52c40894ab9e17dbb974d5388d0a027d2af
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1772-4-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1772-5-0x00000000004472EE-mapping.dmp family_agenttesla behavioral1/memory/1772-6-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1772-7-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\sLbGMVN = "C:\\Users\\Admin\\AppData\\Roaming\\sLbGMVN\\sLbGMVN.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 272 set thread context of 1772 272 DOC.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1912 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1772 RegSvcs.exe 1772 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1772 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 272 wrote to memory of 1860 272 DOC.exe 26 PID 272 wrote to memory of 1860 272 DOC.exe 26 PID 272 wrote to memory of 1860 272 DOC.exe 26 PID 272 wrote to memory of 1860 272 DOC.exe 26 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 272 wrote to memory of 1772 272 DOC.exe 28 PID 1772 wrote to memory of 1912 1772 RegSvcs.exe 30 PID 1772 wrote to memory of 1912 1772 RegSvcs.exe 30 PID 1772 wrote to memory of 1912 1772 RegSvcs.exe 30 PID 1772 wrote to memory of 1912 1772 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC.exe"C:\Users\Admin\AppData\Local\Temp\DOC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nGADTNiT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBC5B.tmp"2⤵
- Creates scheduled task(s)
PID:1860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1912
-
-