Analysis
-
max time kernel
147s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-02-2021 19:33
Static task
static1
Behavioral task
behavioral1
Sample
ORDER 2021022500010101001010.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ORDER 2021022500010101001010.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ORDER 2021022500010101001010.exe
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.ceotech.com.tr - Port:
587 - Username:
[email protected] - Password:
Ceo.tech.123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2324-14-0x00000000004375CE-mapping.dmp family_agenttesla behavioral2/memory/2324-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ORDER 2021022500010101001010.exedescription pid process target process PID 4712 set thread context of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
ORDER 2021022500010101001010.exeORDER 2021022500010101001010.exepid process 4712 ORDER 2021022500010101001010.exe 4712 ORDER 2021022500010101001010.exe 4712 ORDER 2021022500010101001010.exe 2324 ORDER 2021022500010101001010.exe 2324 ORDER 2021022500010101001010.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ORDER 2021022500010101001010.exeORDER 2021022500010101001010.exedescription pid process Token: SeDebugPrivilege 4712 ORDER 2021022500010101001010.exe Token: SeDebugPrivilege 2324 ORDER 2021022500010101001010.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ORDER 2021022500010101001010.exedescription pid process target process PID 4712 wrote to memory of 2108 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2108 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2108 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe PID 4712 wrote to memory of 2324 4712 ORDER 2021022500010101001010.exe ORDER 2021022500010101001010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER 2021022500010101001010.exe"C:\Users\Admin\AppData\Local\Temp\ORDER 2021022500010101001010.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\ORDER 2021022500010101001010.exe"C:\Users\Admin\AppData\Local\Temp\ORDER 2021022500010101001010.exe"2⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\ORDER 2021022500010101001010.exe"C:\Users\Admin\AppData\Local\Temp\ORDER 2021022500010101001010.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2324-14-0x00000000004375CE-mapping.dmp
-
memory/2324-22-0x0000000006260000-0x0000000006261000-memory.dmpFilesize
4KB
-
memory/2324-21-0x00000000061D0000-0x00000000061D1000-memory.dmpFilesize
4KB
-
memory/2324-20-0x0000000005590000-0x0000000005591000-memory.dmpFilesize
4KB
-
memory/2324-15-0x0000000073FA0000-0x000000007468E000-memory.dmpFilesize
6.9MB
-
memory/2324-13-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4712-7-0x0000000004E10000-0x0000000004E11000-memory.dmpFilesize
4KB
-
memory/4712-10-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB
-
memory/4712-11-0x0000000002750000-0x0000000002753000-memory.dmpFilesize
12KB
-
memory/4712-12-0x00000000051E0000-0x000000000523C000-memory.dmpFilesize
368KB
-
memory/4712-9-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/4712-8-0x0000000002720000-0x0000000002721000-memory.dmpFilesize
4KB
-
memory/4712-2-0x0000000073FA0000-0x000000007468E000-memory.dmpFilesize
6.9MB
-
memory/4712-6-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/4712-5-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/4712-3-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB