Analysis
-
max time kernel
146s -
max time network
39s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 16:05
Static task
static1
Behavioral task
behavioral1
Sample
Receipt..exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Receipt..exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
Receipt..exe
-
Size
889KB
-
MD5
6393d967302f542e074c717e44aa0650
-
SHA1
9d414bbf84e7c8d670f16e58cfeafa15a539b2bd
-
SHA256
a2f08d29bb884b329c3d0379d8c700622a913cefb97608ffee6e5dfd4513ede1
-
SHA512
2f524745837b0c0827f1565adbf75ced090bc249e6fb8e5a2626601470535909aca5d95d700c822df0f2ba21dbda9c7476920c459bee6f5803f5670090bb021b
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.ombakparadise.com - Port:
587 - Username:
[email protected] - Password:
eng!@#paradise
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/660-63-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/660-64-0x0000000000437A3E-mapping.dmp family_agenttesla -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Receipt..exedescription pid process target process PID 752 set thread context of 660 752 Receipt..exe vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dw20.exepid process 1064 dw20.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Receipt..exevbc.exedescription pid process target process PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 752 wrote to memory of 660 752 Receipt..exe vbc.exe PID 660 wrote to memory of 1064 660 vbc.exe dw20.exe PID 660 wrote to memory of 1064 660 vbc.exe dw20.exe PID 660 wrote to memory of 1064 660 vbc.exe dw20.exe PID 660 wrote to memory of 1064 660 vbc.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Receipt..exe"C:\Users\Admin\AppData\Local\Temp\Receipt..exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3923⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1064
-
-