Analysis
-
max time kernel
150s -
max time network
15s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-04-2021 05:23
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT SWIFT COPY MT103.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PAYMENT SWIFT COPY MT103.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
PAYMENT SWIFT COPY MT103.exe
-
Size
819KB
-
MD5
c4496bf2025faf96c00b63c0b892876f
-
SHA1
8619a3a581203b3abd1437ab27c2bbde155cbefc
-
SHA256
ec3b903a30c68853b60ea2f08eeef7f140e0c9b8b0c8deee2bc504ca1c2a1a51
-
SHA512
4345c8c32c0b359397ca1b4b83c230e741ba1eef9cde3fa9030105aee96ea685f8e5a5ecebe2cc1c6d8b13a2668400e27bd7085d64cb4e30afc0fea64976ea3a
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
bilalahmed@shangrila-pk.com - Password:
YnFX@HO9
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/804-10-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/804-11-0x000000000043763E-mapping.dmp family_agenttesla behavioral1/memory/804-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PAYMENT SWIFT COPY MT103.exedescription pid process target process PID 1812 set thread context of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
PAYMENT SWIFT COPY MT103.exePAYMENT SWIFT COPY MT103.exepid process 1812 PAYMENT SWIFT COPY MT103.exe 1812 PAYMENT SWIFT COPY MT103.exe 804 PAYMENT SWIFT COPY MT103.exe 804 PAYMENT SWIFT COPY MT103.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PAYMENT SWIFT COPY MT103.exePAYMENT SWIFT COPY MT103.exedescription pid process Token: SeDebugPrivilege 1812 PAYMENT SWIFT COPY MT103.exe Token: SeDebugPrivilege 804 PAYMENT SWIFT COPY MT103.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
PAYMENT SWIFT COPY MT103.exedescription pid process target process PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe PID 1812 wrote to memory of 804 1812 PAYMENT SWIFT COPY MT103.exe PAYMENT SWIFT COPY MT103.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT COPY MT103.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT COPY MT103.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT COPY MT103.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT COPY MT103.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/804-10-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/804-11-0x000000000043763E-mapping.dmp
-
memory/804-12-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/804-13-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/804-15-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/1812-2-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/1812-3-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/1812-5-0x0000000004B00000-0x0000000004B01000-memory.dmpFilesize
4KB
-
memory/1812-6-0x0000000000A00000-0x0000000000A04000-memory.dmpFilesize
16KB
-
memory/1812-7-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/1812-8-0x0000000005CD0000-0x0000000005D85000-memory.dmpFilesize
724KB
-
memory/1812-9-0x00000000050E0000-0x000000000515D000-memory.dmpFilesize
500KB