Analysis
-
max time kernel
146s -
max time network
67s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-04-2021 14:11
Static task
static1
Behavioral task
behavioral1
Sample
DUBAI DEH3231COD.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
DUBAI DEH3231COD.exe
Resource
win10v20210408
General
-
Target
DUBAI DEH3231COD.exe
-
Size
823KB
-
MD5
170e81d276c5d1495b5f742c74df2903
-
SHA1
97c0bfecf5971aa3396652d845c2268c35b25381
-
SHA256
5e4efbd4ced4af5859b50e911dce466d8e1d4d84077598513858c2011e6c82b6
-
SHA512
71e2e0bcbd16d32b4aeab991fa48281f4e201438aa0457da99db22cbcbbda7b5262b7992b0cbb8fe61c0b100ada57254f28a5a09e737aca92f1bb78bf9c2e16e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.satguruclearing.com - Port:
587 - Username:
[email protected] - Password:
satguru@9939*
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1128-124-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/1128-125-0x00000000004375EE-mapping.dmp family_agenttesla behavioral2/memory/1128-131-0x0000000004F20000-0x000000000541E000-memory.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
DUBAI DEH3231COD.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\AlxpSuW = "C:\\Users\\Admin\\AppData\\Roaming\\AlxpSuW\\AlxpSuW.exe" DUBAI DEH3231COD.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DUBAI DEH3231COD.exedescription pid process target process PID 1032 set thread context of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
DUBAI DEH3231COD.exeDUBAI DEH3231COD.exepid process 1032 DUBAI DEH3231COD.exe 1032 DUBAI DEH3231COD.exe 1032 DUBAI DEH3231COD.exe 1128 DUBAI DEH3231COD.exe 1128 DUBAI DEH3231COD.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DUBAI DEH3231COD.exeDUBAI DEH3231COD.exedescription pid process Token: SeDebugPrivilege 1032 DUBAI DEH3231COD.exe Token: SeDebugPrivilege 1128 DUBAI DEH3231COD.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
DUBAI DEH3231COD.exedescription pid process target process PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe PID 1032 wrote to memory of 1128 1032 DUBAI DEH3231COD.exe DUBAI DEH3231COD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"C:\Users\Admin\AppData\Local\Temp\DUBAI DEH3231COD.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DUBAI DEH3231COD.exe.logMD5
c3cc52ccca9ff2b6fa8d267fc350ca6b
SHA1a68d4028333296d222e4afd75dea36fdc98d05f3
SHA2563125b6071e2d78f575a06ed7ac32a83d9262ae64d1fa81ac43e8bfc1ef157c0e
SHA512b0c7b2501b1a2c559795a9d178c0bbda0e03cbdbaaa2c4330ac1202a55373fe1b742078adcfa915bd6e805565a2daa6d35d64ef7a14ffcd09069f9ea6a691cc7
-
memory/1032-121-0x0000000005370000-0x0000000005376000-memory.dmpFilesize
24KB
-
memory/1032-123-0x0000000001000000-0x000000000104A000-memory.dmpFilesize
296KB
-
memory/1032-118-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/1032-119-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/1032-120-0x0000000004FA0000-0x000000000549E000-memory.dmpFilesize
5.0MB
-
memory/1032-114-0x0000000000700000-0x0000000000701000-memory.dmpFilesize
4KB
-
memory/1032-122-0x0000000005DA0000-0x0000000005E23000-memory.dmpFilesize
524KB
-
memory/1032-117-0x0000000005040000-0x0000000005041000-memory.dmpFilesize
4KB
-
memory/1032-116-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/1128-125-0x00000000004375EE-mapping.dmp
-
memory/1128-124-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1128-131-0x0000000004F20000-0x000000000541E000-memory.dmpFilesize
5.0MB
-
memory/1128-132-0x0000000005A20000-0x0000000005A21000-memory.dmpFilesize
4KB
-
memory/1128-133-0x0000000005AC0000-0x0000000005AC1000-memory.dmpFilesize
4KB