Analysis

  • max time kernel
    49s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 19:29

General

  • Target

    RFQ 342 W-Heavy.exe

  • Size

    499KB

  • MD5

    76bb8d3cf1b086d5217c9c8872187821

  • SHA1

    6dd66e7fb11a8aeafba22d63c1c17a2b6d8cbea4

  • SHA256

    4c886afcf091e440b12ade502e4b8dcd2e9995cb2c10d7c0f8fd16e736d6fca6

  • SHA512

    282a847853e0fff60bc79afd2f44ae099112093e7fe5f9d779ad333c2a9807ea0619a04f02c957fae815d16e0639f3b20e99e9639e9062863e4341c1ac3f5327

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sridurgaagros.com
  • Port:
    587
  • Username:
    bestlog@sridurgaagros.com
  • Password:
    @Hammer75

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • AgentTesla Payload 4 IoCs
  • rezer0 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Drops file in Drivers directory 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ 342 W-Heavy.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ 342 W-Heavy.exe"
    1⤵
    • Windows security modification
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ykbVJGg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1FA1.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1224
    • C:\Users\Admin\AppData\Local\Temp\RFQ 342 W-Heavy.exe
      "{path}"
      2⤵
      • Drops file in Drivers directory
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\SysWOW64\netsh.exe
        "netsh" wlan show profile
        3⤵
          PID:2016

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp1FA1.tmp
      MD5

      806836e2da82d550acda6dadf265f10c

      SHA1

      786e097250aab0e2a4232a4ef8d205b968a80261

      SHA256

      d006c897b7eb02f9a241b62bd91722977ddaafa0f072ab4701f15a8d6191d895

      SHA512

      9753489d32f0801f6bdbbc16ae2ee69bc583bc3860af9704efcd9a23ed1d2b3671b13b3d3dd6b21970a6abc52b2fbe3b9fa2fd88dedddc6f86e04a43d564b38e

    • memory/912-49-0x0000000074670000-0x0000000074D5E000-memory.dmp
      Filesize

      6.9MB

    • memory/912-48-0x0000000000400000-0x0000000000450000-memory.dmp
      Filesize

      320KB

    • memory/912-47-0x0000000000400000-0x0000000000450000-memory.dmp
      Filesize

      320KB

    • memory/912-46-0x000000000044B05E-mapping.dmp
    • memory/912-45-0x0000000000400000-0x0000000000450000-memory.dmp
      Filesize

      320KB

    • memory/1224-43-0x0000000000000000-mapping.dmp
    • memory/1500-7-0x0000000000AC0000-0x0000000000AC1000-memory.dmp
      Filesize

      4KB

    • memory/1500-42-0x0000000006330000-0x0000000006331000-memory.dmp
      Filesize

      4KB

    • memory/1500-10-0x0000000005260000-0x0000000005261000-memory.dmp
      Filesize

      4KB

    • memory/1500-13-0x0000000005690000-0x0000000005691000-memory.dmp
      Filesize

      4KB

    • memory/1500-18-0x00000000060E0000-0x00000000060E1000-memory.dmp
      Filesize

      4KB

    • memory/1500-19-0x0000000006110000-0x0000000006111000-memory.dmp
      Filesize

      4KB

    • memory/1500-26-0x00000000062A0000-0x00000000062A1000-memory.dmp
      Filesize

      4KB

    • memory/1500-27-0x00000000055F0000-0x00000000055F1000-memory.dmp
      Filesize

      4KB

    • memory/1500-41-0x0000000006320000-0x0000000006321000-memory.dmp
      Filesize

      4KB

    • memory/1500-9-0x0000000002450000-0x0000000002451000-memory.dmp
      Filesize

      4KB

    • memory/1500-8-0x0000000004840000-0x0000000004841000-memory.dmp
      Filesize

      4KB

    • memory/1500-5-0x0000000000000000-mapping.dmp
    • memory/1500-6-0x0000000074670000-0x0000000074D5E000-memory.dmp
      Filesize

      6.9MB

    • memory/1588-0-0x0000000074670000-0x0000000074D5E000-memory.dmp
      Filesize

      6.9MB

    • memory/1588-4-0x0000000005240000-0x0000000005292000-memory.dmp
      Filesize

      328KB

    • memory/1588-3-0x0000000000530000-0x0000000000533000-memory.dmp
      Filesize

      12KB

    • memory/1588-1-0x0000000001220000-0x0000000001221000-memory.dmp
      Filesize

      4KB

    • memory/2016-52-0x0000000000000000-mapping.dmp