Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
MDS5932RFQ.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MDS5932RFQ.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
MDS5932RFQ.exe
-
Size
1.7MB
-
MD5
fbf64913f493897b86b2dd9986dc91b1
-
SHA1
e6b15e75ca2670e924b2807a71a3ac2c3a5765eb
-
SHA256
4a3f756ee91cc744cc968f8403aceb899834fe241dc7f274d3870262b513dbb9
-
SHA512
6527bf9e08b883d28719677f9b95e95ef838d28db324a4629454c5473641582310e18f630a7acfc1cf86977060af68739194f31c133377a10df25759a786e146
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
Processes:
MDS5932RFQ.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.url MDS5932RFQ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MDS5932RFQ.exedescription pid process target process PID 1316 set thread context of 3884 1316 MDS5932RFQ.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSBuild.exepid process 3884 MSBuild.exe 3884 MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
MDS5932RFQ.exepid process 1316 MDS5932RFQ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 3884 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
MDS5932RFQ.exepid process 1316 MDS5932RFQ.exe 1316 MDS5932RFQ.exe 1316 MDS5932RFQ.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
MDS5932RFQ.exepid process 1316 MDS5932RFQ.exe 1316 MDS5932RFQ.exe 1316 MDS5932RFQ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
MDS5932RFQ.exedescription pid process target process PID 1316 wrote to memory of 3884 1316 MDS5932RFQ.exe MSBuild.exe PID 1316 wrote to memory of 3884 1316 MDS5932RFQ.exe MSBuild.exe PID 1316 wrote to memory of 3884 1316 MDS5932RFQ.exe MSBuild.exe PID 1316 wrote to memory of 3884 1316 MDS5932RFQ.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MDS5932RFQ.exe"C:\Users\Admin\AppData\Local\Temp\MDS5932RFQ.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1316-3-0x0000000001110000-0x0000000001147000-memory.dmpFilesize
220KB
-
memory/1316-4-0x0000000000D80000-0x0000000000D83000-memory.dmpFilesize
12KB
-
memory/3884-2-0x00000000004375FE-mapping.dmp
-
memory/3884-5-0x0000000002EE0000-0x0000000002EE1000-memory.dmpFilesize
4KB
-
memory/3884-6-0x0000000002EE1000-0x0000000002EE2000-memory.dmpFilesize
4KB
-
memory/3884-7-0x0000000002EE2000-0x0000000002EE3000-memory.dmpFilesize
4KB