Analysis
-
max time kernel
67s -
max time network
29s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-12-2020 11:47
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe
-
Size
828KB
-
MD5
2bdefd73dd2bb3c79fb31f58b979c497
-
SHA1
3df7f884fcaf945946443a451ddd5e8170dc6ca7
-
SHA256
68b03caba912a93057cc47618982c7c33ec41ccc1ab853b2e0d7483a383df603
-
SHA512
f8097b3ec587abb29f8eb0df75cc70e9ebf7e5a997827571dceeadc1fd63bf58a56a22717877cfd4625035d9be036ee4b61def76d6cf2c4080cd10e4b15fa335
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.soin3.com - Port:
587 - Username:
mojo@soin3.com - Password:
icui4cu2@@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1368-6-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1368-7-0x000000000043722E-mapping.dmp family_agenttesla behavioral1/memory/1368-8-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1368-9-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exedescription pid process target process PID 532 set thread context of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe -
Drops file in Windows directory 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exeSecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exepid process 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe 1368 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe 1368 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exeSecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exedescription pid process Token: SeDebugPrivilege 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe Token: SeDebugPrivilege 1368 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exedescription pid process target process PID 532 wrote to memory of 1412 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1412 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1412 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1412 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe PID 532 wrote to memory of 1368 532 SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Agent.EZWQ.26739.4560.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cchMD5
ffe49d7f3dfb6964aa7d8da1e91dffac
SHA12d573696f21f06b91d4bc0c371f7b89e0f940887
SHA2565a517ee191b151185f684b5fd6b5d48cd43f06306766c27ca024513b55e21da9
SHA512df2a1ea3b0df4c48178ff8c5fed6bba385dc70f63778aa6fb7e50497c64f1deef27e11139948f8f9f63e052ae1b5cbccfa6a6193a9afc4c088d18f1a0f94f6f3
-
memory/1368-6-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1368-7-0x000000000043722E-mapping.dmp
-
memory/1368-8-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1368-9-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB