Analysis
-
max time kernel
144s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
04-05-2021 15:26
Static task
static1
Behavioral task
behavioral1
Sample
Ei76uYS4ahe752B.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Ei76uYS4ahe752B.exe
Resource
win10v20210408
General
-
Target
Ei76uYS4ahe752B.exe
-
Size
670KB
-
MD5
37bdeb7dd32f6bf7ef310ca575f4236d
-
SHA1
fbd39cda4384a9bef901bb74afe2e42240fde4b2
-
SHA256
f3299da1eb5ad076c503fa440ba15e4bb418fa17b5cf0315620eaecf3b618de5
-
SHA512
b42edd28261294da3d6ac4c0a53ce5a1fbc6fe4060790c84e554139377a6c278fda6f045c0f086c667d72755c0ee7a7f97884d75e37930e62cafb4b00db4ca4d
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.caltra.pt - Port:
587 - Username:
ricardo.godinho@caltra.pt - Password:
caltra1589
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1352-69-0x000000000043763E-mapping.dmp family_agenttesla behavioral1/memory/1352-68-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1352-70-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ei76uYS4ahe752B.exedescription pid process target process PID 1888 set thread context of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Ei76uYS4ahe752B.exepid process 1352 Ei76uYS4ahe752B.exe 1352 Ei76uYS4ahe752B.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Ei76uYS4ahe752B.exedescription pid process Token: SeDebugPrivilege 1352 Ei76uYS4ahe752B.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Ei76uYS4ahe752B.exedescription pid process target process PID 1888 wrote to memory of 1076 1888 Ei76uYS4ahe752B.exe schtasks.exe PID 1888 wrote to memory of 1076 1888 Ei76uYS4ahe752B.exe schtasks.exe PID 1888 wrote to memory of 1076 1888 Ei76uYS4ahe752B.exe schtasks.exe PID 1888 wrote to memory of 1076 1888 Ei76uYS4ahe752B.exe schtasks.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe PID 1888 wrote to memory of 1352 1888 Ei76uYS4ahe752B.exe Ei76uYS4ahe752B.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ei76uYS4ahe752B.exe"C:\Users\Admin\AppData\Local\Temp\Ei76uYS4ahe752B.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZYFvmNSaXwQGa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA40C.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Ei76uYS4ahe752B.exe"C:\Users\Admin\AppData\Local\Temp\Ei76uYS4ahe752B.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA40C.tmpMD5
9725e42981515f26bf464636219de246
SHA1a1104237b90f00d382546ecc24bc15a5b32a1cdf
SHA256ce8476934ff9c5ed01751fae792eda9b6934b42e369585f8309a5fc4efbfd6c9
SHA512ec789ea3ad6cad7b6139521dccdc6fd7a7eea40446b47595d1b4d23ef9d7d1330543ef687fa61354672801dbf1a5298056c6dad72aabe516202fa16040e29691
-
memory/1076-66-0x0000000000000000-mapping.dmp
-
memory/1352-69-0x000000000043763E-mapping.dmp
-
memory/1352-68-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1352-70-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1352-72-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB
-
memory/1888-60-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/1888-62-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/1888-63-0x00000000003B0000-0x00000000003BE000-memory.dmpFilesize
56KB
-
memory/1888-64-0x00000000042E0000-0x0000000004356000-memory.dmpFilesize
472KB
-
memory/1888-65-0x0000000004810000-0x000000000484E000-memory.dmpFilesize
248KB