Analysis
-
max time kernel
94s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
26-02-2021 06:53
Static task
static1
Behavioral task
behavioral1
Sample
Recibo del envío.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Recibo del envío.exe
Resource
win10v20201028
General
-
Target
Recibo del envío.exe
-
Size
1000KB
-
MD5
30f590b7eac07fe6dc2da82d74cb7f01
-
SHA1
806e9df9cbe214445752e34f50392b5690209991
-
SHA256
53480d705948121a9bc2c0e0570b85b141b3e2044798f550fe8421fea55d5d70
-
SHA512
062d6e0fcda49649ac3fd6e55e6d8f91e7c2d4989219b535ccf0934fd058c9ad98b685de65a2d3c1ec99a77bbc500a705bcf8319d53af8aaf7be6cc0522c5f58
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Recibo del envío.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\file.exe = "C:\\Users\\Admin\\AppData\\Roaming\\file.exe" Recibo del envío.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Recibo del envío.exepid process 528 Recibo del envío.exe 528 Recibo del envío.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Recibo del envío.exedescription pid process Token: SeDebugPrivilege 528 Recibo del envío.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/528-2-0x00007FFAB5E90000-0x00007FFAB687C000-memory.dmpFilesize
9.9MB
-
memory/528-3-0x0000000000920000-0x0000000000921000-memory.dmpFilesize
4KB
-
memory/528-5-0x0000000003460000-0x0000000003536000-memory.dmpFilesize
856KB
-
memory/528-6-0x00000000035B0000-0x00000000035B2000-memory.dmpFilesize
8KB
-
memory/528-7-0x000000001C490000-0x000000001C554000-memory.dmpFilesize
784KB
-
memory/528-9-0x0000000001320000-0x0000000001321000-memory.dmpFilesize
4KB
-
memory/528-10-0x00000000035B2000-0x00000000035B4000-memory.dmpFilesize
8KB