Analysis
-
max time kernel
147s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
20-04-2021 20:52
Static task
static1
Behavioral task
behavioral1
Sample
SOA COPY.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA COPY.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
SOA COPY.exe
-
Size
611KB
-
MD5
5b06b2e2ac7a46b0a010e22b8b757842
-
SHA1
32ca16c02b65b3c926afdda78cb01f760f07cb88
-
SHA256
e8834d8376e9d83c926bd5ccbaf4af8bf76ad6d49fb4245a69253e5052293e07
-
SHA512
50ba996ab550bf3697d3bb942097fff13f46a2e218758231b918181114df0fb99e938a62ea07cb2a0a0d4a733bd0a8e18122182afb7cc8026809043a57cfd495
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
a2plcpnl0347.prod.iad2.secureserver.net - Port:
587 - Username:
[email protected] - Password:
Admin_123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1016-126-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/1016-127-0x000000000043765E-mapping.dmp family_agenttesla behavioral2/memory/1016-132-0x00000000057F0000-0x0000000005CEE000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\AvrzbM = "C:\\Users\\Admin\\AppData\\Roaming\\AvrzbM\\AvrzbM.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SOA COPY.exedescription pid process target process PID 4060 set thread context of 1016 4060 SOA COPY.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SOA COPY.exeRegSvcs.exepid process 4060 SOA COPY.exe 4060 SOA COPY.exe 4060 SOA COPY.exe 4060 SOA COPY.exe 1016 RegSvcs.exe 1016 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SOA COPY.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4060 SOA COPY.exe Token: SeDebugPrivilege 1016 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
SOA COPY.exedescription pid process target process PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe PID 4060 wrote to memory of 1016 4060 SOA COPY.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA COPY.exe"C:\Users\Admin\AppData\Local\Temp\SOA COPY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-