Analysis Overview
SHA256
d91e999a7466f56e8cc31598ac1735c57a6d864fb8eb5044fc6a1bcf8f5f4f13
Threat Level: Known bad
The file STATEMENT OF ACCOUNT.exe was found to be: Known bad.
Malicious Activity Summary
Snakebot family
AgentTesla
Contains SnakeBOT related strings
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Suspicious behavior: RenamesItself
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Modifies Internet Explorer settings
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2020-11-09 19:37
Signatures
Snakebot family
Contains SnakeBOT related strings
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2020-11-09 19:37
Reported
2020-11-09 22:12
Platform
win7v20201028
Max time kernel
39s
Max time network
126s
Command Line
Signatures
AgentTesla
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe
"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | www.google.com.br | udp |
| N/A | 172.217.19.195:443 | www.google.com.br | tcp |
| N/A | 8.8.8.8:53 | www.google.com | udp |
| N/A | 172.217.20.100:443 | www.google.com | tcp |
| N/A | 8.8.8.8:53 | www.gstatic.com | udp |
| N/A | 172.217.20.67:443 | www.gstatic.com | tcp |
| N/A | 8.8.8.8:53 | crl.verisign.com | udp |
| N/A | 23.52.27.27:80 | tcp |
Files
memory/368-22-0x000007FEF6680000-0x000007FEF68FA000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2020-11-09 19:37
Reported
2020-11-09 22:12
Platform
win10v20201028
Max time kernel
69s
Max time network
127s
Command Line
Signatures
AgentTesla
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe
"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | www.google.com.br | udp |
| N/A | 172.217.19.195:443 | www.google.com.br | tcp |
| N/A | 8.8.8.8:53 | www.google.com | udp |
| N/A | 172.217.20.100:443 | www.google.com | tcp |
| N/A | 204.79.197.200:443 | tcp | |
| N/A | 8.8.8.8:53 | smtp.yandex.com | udp |
| N/A | 77.88.21.158:587 | smtp.yandex.com | tcp |
| N/A | 204.79.197.200:443 | tcp | |
| N/A | 8.8.8.8:53 | www.gstatic.com | udp |
| N/A | 172.217.20.67:443 | www.gstatic.com | tcp |