Overview
overview
10Static
static
8Fattura_01137434.xlsm
windows7_x64
1Fattura_01137434.xlsm
windows10_x64
1Fattura_01438445.xlsm
windows7_x64
1Fattura_01438445.xlsm
windows10_x64
1Fattura_01634446.xlsm
windows7_x64
1Fattura_01634446.xlsm
windows10_x64
1IMG_056_107_0282.exe
windows7_x64
10IMG_056_107_0282.exe
windows10_x64
10IMG_056_107_0282.xlsx
windows7_x64
8IMG_056_107_0282.xlsx
windows10_x64
1IMG_5018_330_92.exe
windows7_x64
10IMG_5018_330_92.exe
windows10_x64
10IMG_5018_330_92.xlsx
windows7_x64
8IMG_5018_330_92.xlsx
windows10_x64
1PI.exe
windows7_x64
10PI.exe
windows10_x64
10cks.exe
windows7_x64
10cks.exe
windows10_x64
10Scan_018819.exe
windows7_x64
10Scan_018819.exe
windows10_x64
10slot Charges.exe
windows7_x64
10slot Charges.exe
windows10_x64
10Analysis
-
max time kernel
147s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 21:57
Static task
static1
Behavioral task
behavioral1
Sample
Fattura_01137434.xlsm
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Fattura_01137434.xlsm
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Fattura_01438445.xlsm
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Fattura_01438445.xlsm
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Fattura_01634446.xlsm
Resource
win7v20210410
Behavioral task
behavioral6
Sample
Fattura_01634446.xlsm
Resource
win10v20210410
Behavioral task
behavioral7
Sample
IMG_056_107_0282.exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
IMG_056_107_0282.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
IMG_056_107_0282.xlsx
Resource
win7v20210410
Behavioral task
behavioral10
Sample
IMG_056_107_0282.xlsx
Resource
win10v20210408
Behavioral task
behavioral11
Sample
IMG_5018_330_92.exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
IMG_5018_330_92.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
IMG_5018_330_92.xlsx
Resource
win7v20210410
Behavioral task
behavioral14
Sample
IMG_5018_330_92.xlsx
Resource
win10v20210408
Behavioral task
behavioral15
Sample
PI.exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
PI.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
cks.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
cks.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
Scan_018819.exe
Resource
win7v20210408
Behavioral task
behavioral20
Sample
Scan_018819.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
slot Charges.exe
Resource
win7v20210410
General
-
Target
IMG_5018_330_92.exe
-
Size
723KB
-
MD5
ad44d5764bd7ad4db1e725b66f01498e
-
SHA1
2d64033647906613abfbe2da8176b768d88b9fd5
-
SHA256
798cecbce0139e502fd6b23a7d147480d25a168d93131ba2e59f5b81ddbebb28
-
SHA512
73b295ff876fdcee2ba8c3d2a71a479ac5aeda69d7d4b9f42067c98cafc954925309f2f2ebf4a110844466a03a163bd211a67fcd5aac8f56195bcdf69bbeba6a
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sixjan.xyz - Port:
587 - Username:
[email protected] - Password:
H^i?T2&gWQ({
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral12/memory/3936-124-0x00000000004375FE-mapping.dmp family_agenttesla behavioral12/memory/3936-123-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral12/memory/3936-130-0x00000000051F0000-0x00000000056EE000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
IMG_5018_330_92.exedescription pid process target process PID 2112 set thread context of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
IMG_5018_330_92.exeIMG_5018_330_92.exepid process 2112 IMG_5018_330_92.exe 2112 IMG_5018_330_92.exe 3936 IMG_5018_330_92.exe 3936 IMG_5018_330_92.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
IMG_5018_330_92.exeIMG_5018_330_92.exedescription pid process Token: SeDebugPrivilege 2112 IMG_5018_330_92.exe Token: SeDebugPrivilege 3936 IMG_5018_330_92.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
IMG_5018_330_92.exedescription pid process target process PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe PID 2112 wrote to memory of 3936 2112 IMG_5018_330_92.exe IMG_5018_330_92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG_5018_330_92.exe"C:\Users\Admin\AppData\Local\Temp\IMG_5018_330_92.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IMG_5018_330_92.exeC:\Users\Admin\AppData\Local\Temp\IMG_5018_330_92.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
c31e50ab6f750c3bf7c953131e7d3b05
SHA12ef4f740564cb5c4b3009e9383910337f6f8d42e
SHA2569c277f8f0f0efe176fdd520fda19e40d1900dc84e4f068c1ec33c68488bc0d56
SHA512374ae5a6577e914e457d1d4f6439063de1b6d438279a02cae407753c4af01fb5ac1bc91eb25843905d04eebdefff34e9208bcd5e6d010d7594369a183a28bde9