Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-04-2021 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Company Profile.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Company Profile.exe
Resource
win10v20210408
General
-
Target
Company Profile.exe
-
Size
915KB
-
MD5
1c6644952ce7a22c9acabcd3d95414ef
-
SHA1
87ffc2ab1865111b78ca9b3490251205245f39e5
-
SHA256
ad39169af0ebe9afeba1bc9947951d8235f938f95fb266282860115bc1cad4a4
-
SHA512
461b9968cc60e56931aff43511747a2f0771bc726b902073a969352967bee1ad3f03f0f7977fe74a6cc592ea39173d8098a7291edde30eaaef0e5fc14b0d552c
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.cavannaqroup.com - Port:
587 - Username:
[email protected] - Password:
~Jt2S@+nj1jk
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/292-71-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/292-72-0x00000000004371AE-mapping.dmp family_agenttesla behavioral1/memory/292-74-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Company Profile.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mymp4 = "C:\\Users\\Admin\\AppData\\Roaming\\Mymp4\\Mymp4.exe" Company Profile.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Company Profile.exedescription pid process target process PID 788 set thread context of 292 788 Company Profile.exe Company Profile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Company Profile.exepowershell.exepowershell.exeCompany Profile.exepid process 788 Company Profile.exe 652 powershell.exe 268 powershell.exe 292 Company Profile.exe 292 Company Profile.exe 652 powershell.exe 268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Company Profile.exepowershell.exepowershell.exeCompany Profile.exedescription pid process Token: SeDebugPrivilege 788 Company Profile.exe Token: SeDebugPrivilege 652 powershell.exe Token: SeDebugPrivilege 268 powershell.exe Token: SeDebugPrivilege 292 Company Profile.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Company Profile.exedescription pid process target process PID 788 wrote to memory of 268 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 268 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 268 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 268 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 284 788 Company Profile.exe schtasks.exe PID 788 wrote to memory of 284 788 Company Profile.exe schtasks.exe PID 788 wrote to memory of 284 788 Company Profile.exe schtasks.exe PID 788 wrote to memory of 284 788 Company Profile.exe schtasks.exe PID 788 wrote to memory of 652 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 652 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 652 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 652 788 Company Profile.exe powershell.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe PID 788 wrote to memory of 292 788 Company Profile.exe Company Profile.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IXXAINtgo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE753.tmp"2⤵
- Creates scheduled task(s)
PID:284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IXXAINtgo.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_04aeeef7-5cce-4610-8210-9e4fdd43c064
MD5354b8209f647a42e2ce36d8cf326cc92
SHA198c3117f797df69935f8b09fc9e95accfe3d8346
SHA256feae405d288fdd38438f9d9b54f791f3ce3805f1bb88780da5aca402ad372239
SHA512420be869b58e9a7a2c31f2550ac269df832935692a6431d455a10d9b426781e79d91e30ace2c465633b8a7ff2be1bf49734d8b99a390090dc4b36411d4391ff0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1602f747-c1a3-4345-8dec-4dcb8b1f72e5
MD502ff38ac870de39782aeee04d7b48231
SHA10390d39fa216c9b0ecdb38238304e518fb2b5095
SHA256fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876
SHA51224a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2d686436-375c-4ee1-bd4a-9e44ccd248ba
MD575a8da7754349b38d64c87c938545b1b
SHA15c28c257d51f1c1587e29164cc03ea880c21b417
SHA256bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96
SHA512798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4375eeb7-a65d-43f1-a616-02c5ad6c5370
MD5be4d72095faf84233ac17b94744f7084
SHA1cc78ce5b9c57573bd214a8f423ee622b00ebb1ec
SHA256b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc
SHA51243856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6fe5bd95-2cea-4aea-9c8c-dd67bac4295b
MD5df44874327d79bd75e4264cb8dc01811
SHA11396b06debed65ea93c24998d244edebd3c0209d
SHA25655de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181
SHA51295dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_b3b6fff8-e141-43af-bd2a-269db93b7a80
MD5e36e413334d4226cfecaebdd90e31c04
SHA1a70ab4d400261150d6ce6798cadc6e2539ec84c7
SHA256fa3e9bdb2278858c97da8478ed573db4a6642363775b1530ab0b24571e2c0f4a
SHA512f2cd799769189ca59190fee5b1a44f0a7ead22874763291462fbe86865cdba5ff2854279a0d918b3769ec4d8f4e9198b5ac4f30dc3325386da5b73e18af2ca63
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_bc2fe8ee-69c0-48ce-8821-1fab80ab4eeb
MD5597009ea0430a463753e0f5b1d1a249e
SHA14e38b8bb65ecbd5c9f0d3d8c47f7caba33de6c62
SHA2563fd2a8217a845c43dbc0dc206c28be81d2687aa9ba62019d905aef10cfaec45d
SHA5125d722fa908e64575b2497c60d142e182011a10c6ed33813b3b4796b3147ece1bc96938518b4c8911a1bac3b7560528ebe3e8e754c11015516d335df5d7c6871d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fa12b0a1-3d6a-4bab-a74a-253a75ca0598
MD55e3c7184a75d42dda1a83606a45001d8
SHA194ca15637721d88f30eb4b6220b805c5be0360ed
SHA2568278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59
SHA512fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fd9bf4da-ec38-4847-85c5-d50f35796d4c
MD5a725bb9fafcf91f3c6b7861a2bde6db2
SHA18bb5b83f3cc37ff1e5ea4f02acae38e72364c114
SHA25651651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431
SHA5121c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_fe80cd26-0cf7-4e38-9884-6dab53b04ca9
MD5b6d38f250ccc9003dd70efd3b778117f
SHA1d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a
SHA2564de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265
SHA51267d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5b12eeed07ab4ac1b618837cf8de7a4b0
SHA182df208c0843280a090ead0f9d7d7cffc4e12c82
SHA256b86b32d5c89b0fb4d6efda95d473d4e7200e45b0e7ec5065b969ed7ed54395b5
SHA512fc3c35c97ca92e74c82ba5c12fbdd6351ea022c21494aaffa5069fcd3642fb88f6b927cdd77a53f9fac847dec1558b25dda9085cd2b21dbb78c58f676c76f6cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD54a5d0d1fc3af1c6bb5a8abdb9330d4ce
SHA107075d7e2327e6ff49c57e064a033a23feb871e3
SHA256b65fb6968b8fe466e22b618adeae68aaa98f5b21cecb63ec38db66610976feb0
SHA5121c9d72ddeef65877c828c99f5e5644a68402dfff2f3aa2fad6be42da0c04f90f878741cb7d066e64545869570846804ed47c97e48a4f9f6dd7c976bdca9617bf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD57905460000a95311f4b75325dc6aaa0a
SHA1d4cb2381badfe2294f45bb2bc65a9cadf3e3dde9
SHA256398405b4c5b3b718b81a76f6189381fb3b9766d5766d6be10f2c149e2e74d798
SHA512ca668bf0c3f9c251807e56769fbb03f4f66521143fe72568842e0da1556dd5705092b0b84819fb0be33c62af961bdf23e141763ed14cc038927c5670eda2bba0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5ce869e8f7881dcba3251873682fed48b
SHA1f96d0d911022d7910c81341cccc6a17c2b16eee9
SHA2563f5546bb9128f93ddb27280980bc5e24c1ad937244dd098ddaef1a8545fe048a
SHA512074e20bceb2fe72af3493ffdcd6aef41abb445eae5538c9cbb46762a6badb6de026169f5ebac49f7376ff1ed3fd804886341a0d3fff07adb095f5033f363635c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5dd6b4d1ed8c3e654cd0a1a1a4fcd563e
SHA146a92e477cd2453cc2c1ca2dc95fceecb70efb5c
SHA2565c747f9851f06d54612e6d3780e7c903c9c7cf92916ad5d931e10016c54b4249
SHA512c0fe358be50c18c5df89347a8fd4af19b63b9875af8de8d793ecb9bffbaceee9a18d73c6b10cea52ac2471b10add5f61b2eeeea48ff9be064ad9a62771da5d1c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD529734ca6c9a0c9297889d890ca3ce5e9
SHA187173023d40ce729488bf19391724292ab99fdf4
SHA256dab71f2e9ab986f0fd81b45f38ae48847fd7febf8cb0996e576e10ef84cbb78f
SHA5125290e9d632c6bfba0b6def297c453620dcaa0d43ed00cb742afaaaa33dfe45129a3287e616ba9f275ffc48c5043040a9d1d24820b42510ec4ac74de18bee3b26
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5a9a36ae65554129f0f82ad36b4b88497
SHA155f4396495b23be95baa922ef78a20b624621270
SHA25616069c3bf8b79c1b06295671a5d4a98c03abef4419458c478cb875ae687ec368
SHA5128fc2457fedb716245ed6b65c762896b82bdba0a146af3edee9c136562db3478a009f326cfce11cc904548ba929c6c72ec4c7efc47e200b80afa2032fc9ef3cc7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5217a9d643869202d375b144f12c64f78
SHA15c719c4f08732387d287509aada91d9b57f535b3
SHA256e90aa062ee5e5289cec1ca8cf08f2b949a7a7048443cc05a3c4ea885a84f2392
SHA512aa66755030b3fdd7575800e5c1add9973e8645b528686f58801d041efd71a4f45144edbec286a744f3dd4fb9688a81271d02241703c667894ab8fec23b802ac6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5fe4e5bd0e97e882db1e5af4e99a00757
SHA149609a89991c9231bc0f9f917aa4c97653969075
SHA256adc021b87788fd383df128df7a7145c4fe1668c5a070fca7f43aa65a5ba4cada
SHA512ebcd32b8562b0c1d9c7730542410947fadd94db5f1c33796f029415a6fd736d3e317a472a82a21bfcc754e9e1bd331dd0cf498c84d1fbbe4ef491bc853c7d45a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD515ec63a3fdd57157e84bca1794c4d822
SHA1f1e2483c5b6e2fa7b1261c129eb1ea8826630050
SHA2565048477d879aaef63e60ec11bb99102ed942ad3b00ee81bba1f639fa44b94bcf
SHA512d2ff108089d99d7a3e6e5ab6ae99c5f8e57c35c611dab94f2997d168a3806767fdaf87e2563689f9f271529eba2765e79da3e7f133f014b7a060b1d7f8ca2e35
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD5e32200a4d2884914b78d1b53f81349be
SHA153ba6f666f207e24a06454eae3ed827554e1aeb8
SHA2565353b9b3b91b3dc8f04124b7dcf3830b9aa90a935908e11cf8b8024d3faf3ca7
SHA5123a78e32dd2d38e0728673d7f8032bfef8a16d357600e520975103f1aacd65004ae279c577c8130d23f47425406523dbe5c52187a4bd729916f21028fc661f38a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
MD58434191df9549e394ccb5267b194b822
SHA194340c5cad6219a979caa1084831b0c24d2809c6
SHA256e1224b610bd57986b804aac5bd0278ca02eacb8dfeb37737c57df8c346994b9b
SHA512fd42532fce153f61fb0da262719399f967fb4134a7ec5e1fff49b0e8f5f6a56c5a27eadbcf70bfbada3166265122a0888a3674f07b0c2b4b4c82bb7e2c561a28
-
MD5
4c4c830ed35ac5647255e723a3812011
SHA143b3345ff50518fee0046164995022588183a94a
SHA256f2c551928f57269392c967b11224bccdf7c90216d7034939c11c0c4b7e941f72
SHA5122f99a8321e51295b624f7f88f075c108819100985e8299af59e8e8a13660b200931946820c8229f1b7a84577daede6a90f9a3e6ea67a53af3da7f0eb9971b230
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD5259b138d4977943db05829f2d459976a
SHA176b2d17ad841255266acfab2059d97b60fd0f888
SHA256dd6d6f73b363efd97c2b86d4fec07e6448a0281db3df0375944944797a55c143
SHA5126e7e05396e9752b3103f2da7b2ad1ee0b934c742c75c4dbb6546b364e88adc3fea880d02b7916d6ee1e3b1c8e13344443b502dd7a91d2710b7fc7a2e47cf5230