Analysis
-
max time kernel
35s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 16:05
Static task
static1
Behavioral task
behavioral1
Sample
Receipt..exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Receipt..exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
Receipt..exe
-
Size
889KB
-
MD5
6393d967302f542e074c717e44aa0650
-
SHA1
9d414bbf84e7c8d670f16e58cfeafa15a539b2bd
-
SHA256
a2f08d29bb884b329c3d0379d8c700622a913cefb97608ffee6e5dfd4513ede1
-
SHA512
2f524745837b0c0827f1565adbf75ced090bc249e6fb8e5a2626601470535909aca5d95d700c822df0f2ba21dbda9c7476920c459bee6f5803f5670090bb021b
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.ombakparadise.com - Port:
587 - Username:
[email protected] - Password:
eng!@#paradise
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3416-115-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3416-116-0x0000000000437A3E-mapping.dmp family_agenttesla -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Receipt..exedescription pid process target process PID 1852 set thread context of 3416 1852 Receipt..exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dw20.exepid process 3396 dw20.exe 3396 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 3396 dw20.exe Token: SeBackupPrivilege 3396 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Receipt..exevbc.exedescription pid process target process PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 1852 wrote to memory of 3416 1852 Receipt..exe vbc.exe PID 3416 wrote to memory of 3396 3416 vbc.exe dw20.exe PID 3416 wrote to memory of 3396 3416 vbc.exe dw20.exe PID 3416 wrote to memory of 3396 3416 vbc.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Receipt..exe"C:\Users\Admin\AppData\Local\Temp\Receipt..exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7043⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-