Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 22:03
Static task
static1
Behavioral task
behavioral1
Sample
Ord 2354 png.exe
Resource
win7v20210408
General
-
Target
Ord 2354 png.exe
-
Size
841KB
-
MD5
48af5cf24f8c7fc448ecbfd55d18f426
-
SHA1
e3cf38df72fda964da45323b60bc9bd88abbee15
-
SHA256
4e9cbaacb1aaed119e375ac6799f97162442f24a14785e2371b44c5e76125abb
-
SHA512
378572ffde0731fd3e27761be19741548b3d82d6208542c124f4db415380453d67cec00b297932e8f7a2a02c784c289a62fee1df859372da0eccabdd1ccb30f2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.palletsolutions.ca - Port:
587 - Username:
eloglogs@palletsolutions.ca - Password:
h~Q+QV.(M2?!
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3204-143-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3204-144-0x00000000004375EE-mapping.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Ord 2354 png.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Ord 2354 png.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Ord 2354 png.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Ord 2354 png.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 Ord 2354 png.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Ord 2354 png.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ord 2354 png.exedescription pid process target process PID 4428 set thread context of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exeOrd 2354 png.exeOrd 2354 png.exepowershell.exepid process 1800 powershell.exe 1800 powershell.exe 2840 powershell.exe 4428 Ord 2354 png.exe 3204 Ord 2354 png.exe 3204 Ord 2354 png.exe 644 powershell.exe 2840 powershell.exe 1800 powershell.exe 644 powershell.exe 2840 powershell.exe 644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exeOrd 2354 png.exeOrd 2354 png.exepowershell.exedescription pid process Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 4428 Ord 2354 png.exe Token: SeDebugPrivilege 3204 Ord 2354 png.exe Token: SeDebugPrivilege 644 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Ord 2354 png.exedescription pid process target process PID 4428 wrote to memory of 1800 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 1800 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 1800 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 2840 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 2840 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 2840 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 4388 4428 Ord 2354 png.exe schtasks.exe PID 4428 wrote to memory of 4388 4428 Ord 2354 png.exe schtasks.exe PID 4428 wrote to memory of 4388 4428 Ord 2354 png.exe schtasks.exe PID 4428 wrote to memory of 644 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 644 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 644 4428 Ord 2354 png.exe powershell.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe PID 4428 wrote to memory of 3204 4428 Ord 2354 png.exe Ord 2354 png.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ord 2354 png.exe"C:\Users\Admin\AppData\Local\Temp\Ord 2354 png.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Ord 2354 png.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GIorvZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GIorvZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF55.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GIorvZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Ord 2354 png.exe"C:\Users\Admin\AppData\Local\Temp\Ord 2354 png.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
253c8476da4f7867a94e39133112a313
SHA1317bb2946701db8e05612f313dc68e8c7988d592
SHA2569e2dbe308d1e5580d00f3ef7ac6182bd6e704fd8002a5a253163686954d0404f
SHA51213169432356bbeb48f0e4d7a9c8d40290696fc6d6a61a220e9920a59971cc971fbcb855dece8c6d6c062a98b50a778e2b8771fb68b266653a3bcd9ca27834aa5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0e4be592164635acbff650abbd21f325
SHA10bcaf547106c995225fdbb5f64f2ca21969aa378
SHA256952215534659d3bedac2db0c8b6010e34acc84451517e7c95c9955ee3bc196d7
SHA512b09f78e2fb95c41c359f47cd58c4cbac7ec704a6cecc1047c3f4a9e378e66e7a27ee522a1514a567fe39fae57a086f3c97790dcc80c02c2b87df7b35a092b796
-
C:\Users\Admin\AppData\Local\Temp\tmpFF55.tmpMD5
6ed16b7f224a02ba19eac1f15495ae49
SHA17fefe74ae7fcb535569c51d7419a9682001019c2
SHA256e076e5c8a12b49cf88dacf42c171797f21a28157358c835a39048dfc43892faf
SHA512629c40ad959e661394addeaed7bec4a701a255dc1eca627404eb2c715a518a9a65af3527f1dfc014fcf4050558299a6fff4dbaa16871a73fa4ba1cf3fa8e8fc2
-
memory/644-280-0x0000000007383000-0x0000000007384000-memory.dmpFilesize
4KB
-
memory/644-227-0x000000007F720000-0x000000007F721000-memory.dmpFilesize
4KB
-
memory/644-160-0x0000000007382000-0x0000000007383000-memory.dmpFilesize
4KB
-
memory/644-158-0x0000000007380000-0x0000000007381000-memory.dmpFilesize
4KB
-
memory/644-141-0x0000000000000000-mapping.dmp
-
memory/1800-151-0x00000000072D0000-0x00000000072D1000-memory.dmpFilesize
4KB
-
memory/1800-209-0x0000000009260000-0x0000000009261000-memory.dmpFilesize
4KB
-
memory/1800-128-0x0000000004730000-0x0000000004731000-memory.dmpFilesize
4KB
-
memory/1800-129-0x00000000074C0000-0x00000000074C1000-memory.dmpFilesize
4KB
-
memory/1800-223-0x000000007F2B0000-0x000000007F2B1000-memory.dmpFilesize
4KB
-
memory/1800-131-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/1800-225-0x0000000006E83000-0x0000000006E84000-memory.dmpFilesize
4KB
-
memory/1800-133-0x0000000007330000-0x0000000007331000-memory.dmpFilesize
4KB
-
memory/1800-135-0x0000000007BC0000-0x0000000007BC1000-memory.dmpFilesize
4KB
-
memory/1800-124-0x0000000000000000-mapping.dmp
-
memory/1800-222-0x0000000009550000-0x0000000009551000-memory.dmpFilesize
4KB
-
memory/1800-198-0x00000000091F0000-0x00000000091F1000-memory.dmpFilesize
4KB
-
memory/1800-187-0x0000000009210000-0x0000000009243000-memory.dmpFilesize
204KB
-
memory/1800-166-0x00000000082B0000-0x00000000082B1000-memory.dmpFilesize
4KB
-
memory/1800-154-0x00000000081A0000-0x00000000081A1000-memory.dmpFilesize
4KB
-
memory/1800-156-0x0000000006E80000-0x0000000006E81000-memory.dmpFilesize
4KB
-
memory/1800-161-0x0000000006E82000-0x0000000006E83000-memory.dmpFilesize
4KB
-
memory/2840-224-0x000000007FB50000-0x000000007FB51000-memory.dmpFilesize
4KB
-
memory/2840-229-0x0000000000E73000-0x0000000000E74000-memory.dmpFilesize
4KB
-
memory/2840-163-0x0000000000E72000-0x0000000000E73000-memory.dmpFilesize
4KB
-
memory/2840-162-0x0000000000E70000-0x0000000000E71000-memory.dmpFilesize
4KB
-
memory/2840-130-0x0000000000000000-mapping.dmp
-
memory/3204-164-0x0000000004E30000-0x000000000532E000-memory.dmpFilesize
5.0MB
-
memory/3204-143-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3204-144-0x00000000004375EE-mapping.dmp
-
memory/4388-132-0x0000000000000000-mapping.dmp
-
memory/4428-121-0x0000000005590000-0x00000000055AB000-memory.dmpFilesize
108KB
-
memory/4428-114-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/4428-123-0x00000000011F0000-0x000000000122D000-memory.dmpFilesize
244KB
-
memory/4428-125-0x0000000009440000-0x0000000009441000-memory.dmpFilesize
4KB
-
memory/4428-120-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/4428-122-0x0000000007010000-0x0000000007092000-memory.dmpFilesize
520KB
-
memory/4428-119-0x00000000051C0000-0x0000000005252000-memory.dmpFilesize
584KB
-
memory/4428-118-0x0000000005340000-0x0000000005341000-memory.dmpFilesize
4KB
-
memory/4428-117-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/4428-116-0x0000000005840000-0x0000000005841000-memory.dmpFilesize
4KB