Analysis
-
max time kernel
90s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-01-2021 13:38
Static task
static1
Behavioral task
behavioral1
Sample
HTMY-209871640.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
HTMY-209871640.exe
Resource
win10v20201028
General
-
Target
HTMY-209871640.exe
-
Size
715KB
-
MD5
5dc2b29720ea5d6823f6f2a11308a1f1
-
SHA1
e282164e13cbffb1da812b8dd12ae9c4cb91eac3
-
SHA256
b9df96522a30d05a026ab8874eef5ddae02042585e4cc5773909838250cf2635
-
SHA512
f0bba09345fdb6f134d653554b90f48641d16a0baf4944e66ff852e6286f2ca371c8b3649b893edbfa4b37adcba936d295a0b0ea74f66f5ad05773b6b89dc674
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2036-11-0x0000000000400000-0x000000000044B000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
Processes:
nzsuvx.exe8s0sa49elb2.exepid process 1640 nzsuvx.exe 2036 8s0sa49elb2.exe -
Loads dropped DLL 1 IoCs
Processes:
HTMY-209871640.exepid process 3160 HTMY-209871640.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
nzsuvx.exedescription pid process target process PID 1640 set thread context of 2036 1640 nzsuvx.exe 8s0sa49elb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
nzsuvx.exe8s0sa49elb2.exepid process 1640 nzsuvx.exe 1640 nzsuvx.exe 1640 nzsuvx.exe 1640 nzsuvx.exe 1640 nzsuvx.exe 1640 nzsuvx.exe 1640 nzsuvx.exe 1640 nzsuvx.exe 2036 8s0sa49elb2.exe 2036 8s0sa49elb2.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
nzsuvx.exepid process 1640 nzsuvx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8s0sa49elb2.exedescription pid process Token: SeDebugPrivilege 2036 8s0sa49elb2.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
HTMY-209871640.exenzsuvx.exedescription pid process target process PID 3160 wrote to memory of 1640 3160 HTMY-209871640.exe nzsuvx.exe PID 3160 wrote to memory of 1640 3160 HTMY-209871640.exe nzsuvx.exe PID 3160 wrote to memory of 1640 3160 HTMY-209871640.exe nzsuvx.exe PID 1640 wrote to memory of 2036 1640 nzsuvx.exe 8s0sa49elb2.exe PID 1640 wrote to memory of 2036 1640 nzsuvx.exe 8s0sa49elb2.exe PID 1640 wrote to memory of 2036 1640 nzsuvx.exe 8s0sa49elb2.exe PID 1640 wrote to memory of 2036 1640 nzsuvx.exe 8s0sa49elb2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HTMY-209871640.exe"C:\Users\Admin\AppData\Local\Temp\HTMY-209871640.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Nla\nzsuvx.exeC:\Users\Admin\AppData\Local\Temp\Nla\nzsuvx.exe C:\Users\Admin\AppData\Local\Temp\Nla\oylomfj.osa2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Nla\8s0sa49elb2.exeC:\Users\Admin\AppData\Local\Temp\Nla\nzsuvx.exe C:\Users\Admin\AppData\Local\Temp\Nla\oylomfj.osa3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
221567466782aa578f0dab4523f17eb3
SHA1e55e0798ff6e861bb1f9fabeaa293ef2e799515e
SHA2569d10d8583c2282e85c33a619455bf7254edd11c86bf6e772e7c20254f155b462
SHA5121c34144e7c53e28cf26c43a2f876d83a99cf6481f8523c86e06af35e1287fab23165d25c26fc2772c40a79274d92edd40865591de408a66467703a0c87b1ae9d
-
MD5
9a6b9734f77abff52dd059bd307d567c
SHA163c2ce33958afb54fee604b11631e01af4e14d7f
SHA2569e47afb5842b87d2554d7cea1a2fef948612e64dae5e7d80dc0199db35c6feeb
SHA512a4d4eb844d296820c7b6aef7c1f473820aaecc7906164e03ae8c5576fcf78b293443be1f7518f99cdb28de33b968bc510bf71bb69015a33782d0290737764c32
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
MD5
181fdd7a69005b39ad831dbbbd224b05
SHA1a9bfac6c503d75b4da366b280e697b1375383fd5
SHA256421427ae4a25044dfcf0090733775b46d8dead036be67488a05c6e89805fc3cf
SHA5126abaed11ce67c0c992bc7ea6bc9ddb9c852b24e12cad9fe03180bd2848c2e5349e1e0368698e4d7fcdeeba2defe177195a1dd08b36bf2107f9a11edf0ee871fd
-
MD5
fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c