Analysis
-
max time kernel
110s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-06-2021 12:01
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_document06242021.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Invoice_document06242021.exe
Resource
win10v20210408
General
-
Target
Invoice_document06242021.exe
-
Size
1.2MB
-
MD5
22038021ba9ff2f1b233ce4f4a1ab217
-
SHA1
a22086e8da15b3dd87e83573fc89da4dbd4d1fcd
-
SHA256
1ec3c886cd082c50a8f309de7277c015d49233865dc746a60cbc671df523367d
-
SHA512
aa93db72a9a896069ccb4295069b912f421264858cb42bbc58999be70999dc5283dbf4b69cbebd32d0426c76ac7be5a5a0c49c8095d031e4e85e542d73bd915f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
elshcap@vivaldi.net - Password:
uiU2mz9aspuHUM3
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1540-127-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/1540-128-0x00000000004375CE-mapping.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Invoice_document06242021.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\filename.exe = "C:\\Users\\Admin\\AppData\\Roaming\\filename.exe\\filename.exe.exe" Invoice_document06242021.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Invoice_document06242021.exedescription pid process target process PID 992 set thread context of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Invoice_document06242021.exepid process 1540 Invoice_document06242021.exe 1540 Invoice_document06242021.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Invoice_document06242021.exeInvoice_document06242021.exedescription pid process Token: SeDebugPrivilege 992 Invoice_document06242021.exe Token: SeDebugPrivilege 1540 Invoice_document06242021.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Invoice_document06242021.exedescription pid process target process PID 992 wrote to memory of 504 992 Invoice_document06242021.exe schtasks.exe PID 992 wrote to memory of 504 992 Invoice_document06242021.exe schtasks.exe PID 992 wrote to memory of 504 992 Invoice_document06242021.exe schtasks.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe PID 992 wrote to memory of 1540 992 Invoice_document06242021.exe Invoice_document06242021.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice_document06242021.exe"C:\Users\Admin\AppData\Local\Temp\Invoice_document06242021.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xESkNZNT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6F93.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Invoice_document06242021.exe"C:\Users\Admin\AppData\Local\Temp\Invoice_document06242021.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Invoice_document06242021.exe.logMD5
90acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
C:\Users\Admin\AppData\Local\Temp\tmp6F93.tmpMD5
a347f332d44b9e70502c155b46b5406a
SHA16abe5defdf5561164df505172eac70ac755cdc73
SHA256dfca8e281e404e9ae4c9eea5c640bdc78f5938271130e1744406db3a7bf72955
SHA5122bed62a84fc6a99dd05758f2a2e323c605d73206aeb2471db1c559927d35cba8d3c2b5f1ce66d51b4802d6007362dfd643f4f8f5899fb127527723491039c66d
-
memory/504-125-0x0000000000000000-mapping.dmp
-
memory/992-123-0x0000000006580000-0x00000000065FB000-memory.dmpFilesize
492KB
-
memory/992-118-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/992-120-0x0000000005690000-0x0000000005691000-memory.dmpFilesize
4KB
-
memory/992-121-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/992-122-0x0000000005990000-0x00000000059A0000-memory.dmpFilesize
64KB
-
memory/992-114-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/992-124-0x0000000008B00000-0x0000000008B4C000-memory.dmpFilesize
304KB
-
memory/992-119-0x00000000057C0000-0x0000000005CBE000-memory.dmpFilesize
5.0MB
-
memory/992-117-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB
-
memory/992-116-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/1540-128-0x00000000004375CE-mapping.dmp
-
memory/1540-127-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1540-134-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/1540-135-0x0000000005790000-0x0000000005791000-memory.dmpFilesize
4KB
-
memory/1540-136-0x00000000062C0000-0x00000000062C1000-memory.dmpFilesize
4KB