Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-02-2021 14:33
Static task
static1
Behavioral task
behavioral1
Sample
ITM inspection time change.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ITM inspection time change.exe
Resource
win10v20201028
General
-
Target
ITM inspection time change.exe
-
Size
573KB
-
MD5
507b34df703d6b225425e3818bc5f1e0
-
SHA1
e82bc803194cc2fe5fa56193acdb6183eaecf7cd
-
SHA256
b0ae0cf3460d2a354e39765626ec1059dbcc3d7cb7764abdeaa0790c3e6f574c
-
SHA512
6abead02a54a22ee48676df616b1a06ed2efbdf452461f97a2f4cdfd83ae264deb8a91fa7de5766d3a698ce4c7395df1464b5699c587f2002ccc6af54c4feac4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
PfV^BQW2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3136-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3136-13-0x00000000004375DE-mapping.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmlVNG = "C:\\Users\\Admin\\AppData\\Roaming\\GmlVNG\\GmlVNG.exe" MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 api.ipify.org 14 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ITM inspection time change.exedescription pid process target process PID 4692 set thread context of 3136 4692 ITM inspection time change.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ITM inspection time change.exeMSBuild.exepid process 4692 ITM inspection time change.exe 3136 MSBuild.exe 3136 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ITM inspection time change.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 4692 ITM inspection time change.exe Token: SeDebugPrivilege 3136 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 3136 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ITM inspection time change.exedescription pid process target process PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe PID 4692 wrote to memory of 3136 4692 ITM inspection time change.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ITM inspection time change.exe"C:\Users\Admin\AppData\Local\Temp\ITM inspection time change.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3136