Analysis
-
max time kernel
150s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
20-04-2021 20:52
Static task
static1
Behavioral task
behavioral1
Sample
SOA COPY.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA COPY.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
SOA COPY.exe
-
Size
611KB
-
MD5
5b06b2e2ac7a46b0a010e22b8b757842
-
SHA1
32ca16c02b65b3c926afdda78cb01f760f07cb88
-
SHA256
e8834d8376e9d83c926bd5ccbaf4af8bf76ad6d49fb4245a69253e5052293e07
-
SHA512
50ba996ab550bf3697d3bb942097fff13f46a2e218758231b918181114df0fb99e938a62ea07cb2a0a0d4a733bd0a8e18122182afb7cc8026809043a57cfd495
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
a2plcpnl0347.prod.iad2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
Admin_123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/860-67-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/860-68-0x000000000043765E-mapping.dmp family_agenttesla behavioral1/memory/860-69-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\AvrzbM = "C:\\Users\\Admin\\AppData\\Roaming\\AvrzbM\\AvrzbM.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SOA COPY.exedescription pid process target process PID 684 set thread context of 860 684 SOA COPY.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SOA COPY.exeRegSvcs.exepid process 684 SOA COPY.exe 684 SOA COPY.exe 860 RegSvcs.exe 860 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SOA COPY.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 684 SOA COPY.exe Token: SeDebugPrivilege 860 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SOA COPY.exedescription pid process target process PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe PID 684 wrote to memory of 860 684 SOA COPY.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA COPY.exe"C:\Users\Admin\AppData\Local\Temp\SOA COPY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860
-