Analysis
-
max time kernel
119s -
max time network
49s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 18:05
Static task
static1
Behavioral task
behavioral1
Sample
f744296570d39e6ddddbe45030d989f4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
f744296570d39e6ddddbe45030d989f4.exe
Resource
win10v20210410
General
-
Target
f744296570d39e6ddddbe45030d989f4.exe
-
Size
1.1MB
-
MD5
f744296570d39e6ddddbe45030d989f4
-
SHA1
3c1caa09abe1c23ac8e4ee426bee7ab4b76a6c31
-
SHA256
9b0fd69ae3566f372e59db7964a9186d570aebf499d89294be290bfba0248fa4
-
SHA512
61ac6f6139cbd9cff33aa2d037035f4fdf2522286eb27a63f9b76d59b5445370cb31ec44e45af52139ac5b32f91905cf32d60f8450f76aa7fd5088cbd62a4d37
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cisburo.com - Port:
587 - Username:
[email protected] - Password:
Essaab1967#
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1900-67-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1900-68-0x00000000004375EE-mapping.dmp family_agenttesla behavioral1/memory/1900-69-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f744296570d39e6ddddbe45030d989f4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\newfile = "C:\\Users\\Admin\\AppData\\Roaming\\newfile\\newfile.exe" f744296570d39e6ddddbe45030d989f4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f744296570d39e6ddddbe45030d989f4.exedescription pid process target process PID 1984 set thread context of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f744296570d39e6ddddbe45030d989f4.exepid process 1900 f744296570d39e6ddddbe45030d989f4.exe 1900 f744296570d39e6ddddbe45030d989f4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f744296570d39e6ddddbe45030d989f4.exedescription pid process Token: SeDebugPrivilege 1900 f744296570d39e6ddddbe45030d989f4.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
f744296570d39e6ddddbe45030d989f4.exedescription pid process target process PID 1984 wrote to memory of 1472 1984 f744296570d39e6ddddbe45030d989f4.exe schtasks.exe PID 1984 wrote to memory of 1472 1984 f744296570d39e6ddddbe45030d989f4.exe schtasks.exe PID 1984 wrote to memory of 1472 1984 f744296570d39e6ddddbe45030d989f4.exe schtasks.exe PID 1984 wrote to memory of 1472 1984 f744296570d39e6ddddbe45030d989f4.exe schtasks.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe PID 1984 wrote to memory of 1900 1984 f744296570d39e6ddddbe45030d989f4.exe f744296570d39e6ddddbe45030d989f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f744296570d39e6ddddbe45030d989f4.exe"C:\Users\Admin\AppData\Local\Temp\f744296570d39e6ddddbe45030d989f4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lUNThbzNxoZyoj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33AE.tmp"2⤵
- Creates scheduled task(s)
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\f744296570d39e6ddddbe45030d989f4.exe"C:\Users\Admin\AppData\Local\Temp\f744296570d39e6ddddbe45030d989f4.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
509a253ef9f2dcf7e205bcce8dd0be4f
SHA1842c5320e63c3c10d0aa0621538752adc5c2b688
SHA25699cf8c405655e97b0c60bdf79df6fe59dc5cb4291bd9824c2cdc77986d6a4a75
SHA5123eb58bdead4d31aeb431c5e700ca6c90cfa07315f5bbb501bd7f72c2126a6ee0e943f352379426b33ace2d577ed71925f2c663af1647d0da3fe6ed0a670400c4