Analysis
-
max time kernel
147s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 21:19
Static task
static1
Behavioral task
behavioral1
Sample
OC_007943234.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
OC_007943234.exe
Resource
win10v20201028
General
-
Target
OC_007943234.exe
-
Size
1.1MB
-
MD5
f88bb462cad93be7c9ecfdc0e6dc1da8
-
SHA1
f9a7d7dcb4da0bd68a27520834a302a76d8ad13f
-
SHA256
c9c296508619b1296a45ae03ac10ef57c3390c6c6826b6932f08d38858ea17d7
-
SHA512
be2f6d1bd9d217ced571101272cddacc766b25195769519b7f46df0e90a072ae035aede6ffb515338524312230d1eb7f4422d743baa4aaa857a0b18759c5b7e5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.chrismehat.com - Port:
587 - Username:
[email protected] - Password:
YjuZ%P91;qZ7
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3708-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3708-15-0x000000000043761E-mapping.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
OC_007943234.exedescription pid process target process PID 3988 set thread context of 3708 3988 OC_007943234.exe OC_007943234.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
OC_007943234.exeOC_007943234.exepid process 3988 OC_007943234.exe 3988 OC_007943234.exe 3988 OC_007943234.exe 3708 OC_007943234.exe 3708 OC_007943234.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
OC_007943234.exeOC_007943234.exedescription pid process Token: SeDebugPrivilege 3988 OC_007943234.exe Token: SeDebugPrivilege 3708 OC_007943234.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
OC_007943234.exedescription pid process target process PID 3988 wrote to memory of 4040 3988 OC_007943234.exe schtasks.exe PID 3988 wrote to memory of 4040 3988 OC_007943234.exe schtasks.exe PID 3988 wrote to memory of 4040 3988 OC_007943234.exe schtasks.exe PID 3988 wrote to memory of 2148 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 2148 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 2148 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe PID 3988 wrote to memory of 3708 3988 OC_007943234.exe OC_007943234.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OC_007943234.exe"C:\Users\Admin\AppData\Local\Temp\OC_007943234.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QKvvAj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE9D9.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\OC_007943234.exe"C:\Users\Admin\AppData\Local\Temp\OC_007943234.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\OC_007943234.exe"C:\Users\Admin\AppData\Local\Temp\OC_007943234.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OC_007943234.exe.logMD5
90acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
C:\Users\Admin\AppData\Local\Temp\tmpE9D9.tmpMD5
94361f515f674416b5537f92112af59b
SHA1ff74e5b4f4290c9474c3c7cd95723479555498f6
SHA2568c090e20b47aa46f29c605953e7dc8870de70facdda57a580e39e2a7fb5ed711
SHA5125b74bd0debd9febd2703f43276f1988371dd7bf6518e7810cec2307ffbae66fac0c3ab1ddd3642cb19f934d6aa418f4bbd655883c420a1fc6d78127024b7ea08
-
memory/3708-23-0x0000000005F90000-0x0000000005F91000-memory.dmpFilesize
4KB
-
memory/3708-22-0x00000000057D0000-0x00000000057D1000-memory.dmpFilesize
4KB
-
memory/3708-17-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/3708-15-0x000000000043761E-mapping.dmp
-
memory/3708-14-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3988-7-0x0000000005340000-0x0000000005341000-memory.dmpFilesize
4KB
-
memory/3988-11-0x00000000060C0000-0x0000000006135000-memory.dmpFilesize
468KB
-
memory/3988-10-0x0000000005280000-0x0000000005292000-memory.dmpFilesize
72KB
-
memory/3988-9-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB
-
memory/3988-8-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/3988-2-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/3988-6-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB
-
memory/3988-5-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/3988-3-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/4040-12-0x0000000000000000-mapping.dmp