Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-04-2021 14:11
Static task
static1
Behavioral task
behavioral1
Sample
DUBAI DEH3231COD.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DUBAI DEH3231COD.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
DUBAI DEH3231COD.exe
-
Size
823KB
-
MD5
170e81d276c5d1495b5f742c74df2903
-
SHA1
97c0bfecf5971aa3396652d845c2268c35b25381
-
SHA256
5e4efbd4ced4af5859b50e911dce466d8e1d4d84077598513858c2011e6c82b6
-
SHA512
71e2e0bcbd16d32b4aeab991fa48281f4e201438aa0457da99db22cbcbbda7b5262b7992b0cbb8fe61c0b100ada57254f28a5a09e737aca92f1bb78bf9c2e16e
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
webmail.satguruclearing.com - Port:
587 - Username:
[email protected] - Password:
satguru@9939*
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/412-67-0x00000000004375EE-mapping.dmp family_agenttesla behavioral1/memory/412-66-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/412-68-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
DUBAI DEH3231COD.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\AlxpSuW = "C:\\Users\\Admin\\AppData\\Roaming\\AlxpSuW\\AlxpSuW.exe" DUBAI DEH3231COD.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DUBAI DEH3231COD.exedescription pid process target process PID 484 set thread context of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DUBAI DEH3231COD.exeDUBAI DEH3231COD.exepid process 484 DUBAI DEH3231COD.exe 484 DUBAI DEH3231COD.exe 412 DUBAI DEH3231COD.exe 412 DUBAI DEH3231COD.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DUBAI DEH3231COD.exeDUBAI DEH3231COD.exedescription pid process Token: SeDebugPrivilege 484 DUBAI DEH3231COD.exe Token: SeDebugPrivilege 412 DUBAI DEH3231COD.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
DUBAI DEH3231COD.exedescription pid process target process PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 484 wrote to memory of 412 484 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-