Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 06:13
Static task
static1
Behavioral task
behavioral1
Sample
70654 SSEBACT.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
70654 SSEBACT.exe
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
70654 SSEBACT.exe
-
Size
641KB
-
MD5
4e09874338d28600e8b84184f143bfe8
-
SHA1
488979983bfa154fbb27563454e67903c37e16c3
-
SHA256
ca87f3892de6e488e61c352cafc36fc06d0d8b6eb9fc4d5429ff92038c4b134f
-
SHA512
d58e1582e77fff96197fd7a5d463249ab619a9455a6d1425fdc913f42ac3b60a7fd46ed0f11cac00aee8a97055d86842f7fed1f85cb5a11c59d66a702d7212b2
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
uscentral50.myserverhosts.com - Port:
587 - Username:
sales@radheatwaters.com - Password:
waters@789
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4680-125-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/4680-126-0x000000000043760E-mapping.dmp family_agenttesla behavioral2/memory/4680-131-0x0000000004CF0000-0x00000000051EE000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\NXLun = "C:\\Users\\Admin\\AppData\\Roaming\\NXLun\\NXLun.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
70654 SSEBACT.exedescription pid process target process PID 4564 set thread context of 4680 4564 70654 SSEBACT.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
70654 SSEBACT.exeRegSvcs.exepid process 4564 70654 SSEBACT.exe 4564 70654 SSEBACT.exe 4564 70654 SSEBACT.exe 4564 70654 SSEBACT.exe 4680 RegSvcs.exe 4680 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
70654 SSEBACT.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4564 70654 SSEBACT.exe Token: SeDebugPrivilege 4680 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
70654 SSEBACT.exedescription pid process target process PID 4564 wrote to memory of 4672 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4672 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4672 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe PID 4564 wrote to memory of 4680 4564 70654 SSEBACT.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70654 SSEBACT.exe"C:\Users\Admin\AppData\Local\Temp\70654 SSEBACT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4564-115-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/4564-117-0x0000000005890000-0x0000000005891000-memory.dmpFilesize
4KB
-
memory/4564-118-0x00000000052B0000-0x00000000052B1000-memory.dmpFilesize
4KB
-
memory/4564-119-0x0000000005360000-0x0000000005361000-memory.dmpFilesize
4KB
-
memory/4564-120-0x0000000005390000-0x000000000588E000-memory.dmpFilesize
5.0MB
-
memory/4564-121-0x0000000008D00000-0x0000000008D07000-memory.dmpFilesize
28KB
-
memory/4564-122-0x0000000008DC0000-0x0000000008DC1000-memory.dmpFilesize
4KB
-
memory/4564-123-0x0000000008D50000-0x0000000008DB3000-memory.dmpFilesize
396KB
-
memory/4564-124-0x000000000B5C0000-0x000000000B5FC000-memory.dmpFilesize
240KB
-
memory/4680-125-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/4680-126-0x000000000043760E-mapping.dmp
-
memory/4680-131-0x0000000004CF0000-0x00000000051EE000-memory.dmpFilesize
5.0MB
-
memory/4680-132-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/4680-133-0x0000000005A50000-0x0000000005A51000-memory.dmpFilesize
4KB