Analysis
-
max time kernel
111s -
max time network
109s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-01-2021 10:13
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe
-
Size
39KB
-
MD5
093581879b31e72cb9f58572e92a326b
-
SHA1
79f62189cca9d966bf5fa783f54d6ad9032fe820
-
SHA256
7284ce088723465f101b804f22a27e235f6ae8148dd1120508e3fed43348ed54
-
SHA512
8440c62ca7cb060deea4c96c6957fd59d29c4617acae5b9c6e284caae2610d80ed107bfab765a3c5e010e3744cf6a8b150f633319f8731f142937b05a9a75d6a
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sardaplywood.com - Port:
587 - Username:
superstars@sardaplywood.com - Password:
sup123st45
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1812-6-0x0000000004B70000-0x0000000004BCC000-memory.dmp family_agenttesla behavioral1/memory/1604-7-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1604-8-0x000000000043768E-mapping.dmp family_agenttesla behavioral1/memory/1432-11-0x000000000043768E-mapping.dmp family_agenttesla behavioral1/memory/1604-15-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/112-14-0x000000000043768E-mapping.dmp family_agenttesla behavioral1/memory/1956-26-0x000000000043768E-mapping.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 api.ipify.org 7 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exepid process 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exedescription pid process target process PID 1812 set thread context of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 set thread context of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 set thread context of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 set thread context of 280 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 set thread context of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exeSecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exeSecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exepid process 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1432 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 112 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 1432 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe 112 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exeSecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exeSecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exedescription pid process Token: SeDebugPrivilege 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe Token: SeDebugPrivilege 1432 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe Token: SeDebugPrivilege 112 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exepid process 1432 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exedescription pid process target process PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1604 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1432 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 112 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 280 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 280 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 280 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 280 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 280 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe PID 1812 wrote to memory of 1956 1812 SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.nm.26462.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/112-30-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/112-16-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/112-14-0x000000000043768E-mapping.dmp
-
memory/280-20-0x000000000043768E-mapping.dmp
-
memory/1432-12-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/1432-32-0x0000000004AA1000-0x0000000004AA2000-memory.dmpFilesize
4KB
-
memory/1432-29-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/1432-11-0x000000000043768E-mapping.dmp
-
memory/1604-8-0x000000000043768E-mapping.dmp
-
memory/1604-15-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1604-10-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/1604-7-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1604-31-0x0000000004A00000-0x0000000004A01000-memory.dmpFilesize
4KB
-
memory/1812-2-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/1812-23-0x00000000004C0000-0x00000000004C1000-memory.dmpFilesize
4KB
-
memory/1812-6-0x0000000004B70000-0x0000000004BCC000-memory.dmpFilesize
368KB
-
memory/1812-5-0x0000000004050000-0x0000000004051000-memory.dmpFilesize
4KB
-
memory/1812-3-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/1956-26-0x000000000043768E-mapping.dmp
-
memory/1956-27-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB