Analysis
-
max time kernel
140s -
max time network
61s -
platform
windows7_x64 -
resource
win7 -
submitted
18-07-2020 08:04
Static task
static1
Behavioral task
behavioral1
Sample
PO 17072020 4356553.exe
Resource
win7
Behavioral task
behavioral2
Sample
PO 17072020 4356553.exe
Resource
win10
General
-
Target
PO 17072020 4356553.exe
-
Size
691KB
-
MD5
f75af85fecfba08c11665e2a6a8b77d7
-
SHA1
973ba0ad4191d54a534b720f032ad3161df531d4
-
SHA256
96c9133f07d45f5b33402a782fc456f9eeef61a8111d6ec5ede8cb7d77ba9312
-
SHA512
6e68d157ba78aa719477a14bc36648c58a7c5aa0570c8d779fc5d6b16ca2997d8790f2cedea8052b0da61cbe968f9f055eaebf1fe5298ae5cab80ddcb49b621e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.laben.com.tr - Port:
587 - Username:
[email protected] - Password:
bcUmu3VcCvjQ
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1908-14-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1908-15-0x0000000000446F2E-mapping.dmp family_agenttesla behavioral1/memory/1908-17-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1908-18-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 1400 chromee.exe 1908 RegAsm.exe -
Loads dropped DLL 3 IoCs
pid Process 616 PO 17072020 4356553.exe 1400 chromee.exe 1908 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\chromee = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chromee.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 1908 1400 chromee.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 616 PO 17072020 4356553.exe 616 PO 17072020 4356553.exe 616 PO 17072020 4356553.exe 1400 chromee.exe 1400 chromee.exe 1400 chromee.exe 1908 RegAsm.exe 1908 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 616 PO 17072020 4356553.exe Token: SeDebugPrivilege 1400 chromee.exe Token: SeDebugPrivilege 1908 RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 616 wrote to memory of 792 616 PO 17072020 4356553.exe 24 PID 616 wrote to memory of 792 616 PO 17072020 4356553.exe 24 PID 616 wrote to memory of 792 616 PO 17072020 4356553.exe 24 PID 616 wrote to memory of 792 616 PO 17072020 4356553.exe 24 PID 792 wrote to memory of 360 792 cmd.exe 26 PID 792 wrote to memory of 360 792 cmd.exe 26 PID 792 wrote to memory of 360 792 cmd.exe 26 PID 792 wrote to memory of 360 792 cmd.exe 26 PID 616 wrote to memory of 1400 616 PO 17072020 4356553.exe 27 PID 616 wrote to memory of 1400 616 PO 17072020 4356553.exe 27 PID 616 wrote to memory of 1400 616 PO 17072020 4356553.exe 27 PID 616 wrote to memory of 1400 616 PO 17072020 4356553.exe 27 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30 PID 1400 wrote to memory of 1908 1400 chromee.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO 17072020 4356553.exe"C:\Users\Admin\AppData\Local\Temp\PO 17072020 4356553.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v chromee /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"3⤵
- Adds Run key to start application
PID:360
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chromee.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-