Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    18-10-2021 09:35

General

  • Target

    PAYMENT_COPY_ HSBC BANK_Pdf.exe

  • Size

    38KB

  • MD5

    98c0e8ae038031c7f5f210119c1b0b36

  • SHA1

    e63bb6d9ebe904e805f93f86dba97f6eeb6a5cef

  • SHA256

    f090ea218b1b9efedee6bae4665c1066649dc0fb94542467a56ae5a0a2c693e0

  • SHA512

    951259982fec7ccb4bcdaf4993e85f89ac041f28bd1150616ae59e983b91b5565610d379016a920df7465c7721c41e509802b298eab61e1446b9d47fc84b8e3d

Malware Config

Extracted

Family

limerat

Wallets

3AtEv1cfnjjwnaXZKwxd8fV5xh2sx5qNob

Attributes
  • aes_key

    NYANCAT

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/rmZm7wcd

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    575756.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \windows\

  • usb_spread

    true

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.meyaargroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Meyaar@123$

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • AgentTesla Payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Egogfy.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe
        "C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Maps connected drives based on registry
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\windows\575756.exe'"
          4⤵
          • Creates scheduled task(s)
          PID:1660
        • C:\Users\Admin\AppData\Local\Temp\windows\575756.exe
          "C:\Users\Admin\AppData\Local\Temp\windows\575756.exe"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1356
    • C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Egogfy.vbs

    MD5

    d33af38996d004b235e5c66c04f10d66

    SHA1

    839e50184c2f6e0c6265ebf31f9fb8653ce612b9

    SHA256

    099ea74f33ed5807c65d1ab8f807627841710abae6daf5250527af3fff38555a

    SHA512

    92ee494c32077558f3746d31e1d0e844941f4995ff1fbfbd0f3899a27568d58d2a48b76be698cce8cf8054af34ab774d0f2604b03f00db7ca4b76b0888402ebf

  • C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • C:\Users\Admin\AppData\Local\Temp\windows\575756.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • C:\Users\Admin\AppData\Local\Temp\windows\575756.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • \Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • \Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • \Users\Admin\AppData\Local\Temp\windows\575756.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • \Users\Admin\AppData\Local\Temp\windows\575756.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • memory/508-76-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/508-74-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/508-70-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/508-72-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/508-71-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/508-73-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/508-75-0x0000000000436D0E-mapping.dmp

  • memory/508-78-0x0000000004B70000-0x0000000004B71000-memory.dmp

    Filesize

    4KB

  • memory/540-59-0x0000000000000000-mapping.dmp

  • memory/1296-66-0x0000000000000000-mapping.dmp

  • memory/1296-68-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/1296-87-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/1356-90-0x00000000005D0000-0x00000000005EC000-memory.dmp

    Filesize

    112KB

  • memory/1356-82-0x0000000000000000-mapping.dmp

  • memory/1356-85-0x0000000001350000-0x0000000001351000-memory.dmp

    Filesize

    4KB

  • memory/1356-88-0x0000000004D70000-0x0000000004D71000-memory.dmp

    Filesize

    4KB

  • memory/1356-89-0x00000000004D0000-0x00000000004E6000-memory.dmp

    Filesize

    88KB

  • memory/1660-79-0x0000000000000000-mapping.dmp

  • memory/1764-58-0x0000000005960000-0x0000000005A51000-memory.dmp

    Filesize

    964KB

  • memory/1764-54-0x0000000000C10000-0x0000000000C11000-memory.dmp

    Filesize

    4KB

  • memory/1764-57-0x0000000075B71000-0x0000000075B73000-memory.dmp

    Filesize

    8KB

  • memory/1764-56-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1764-61-0x0000000004470000-0x0000000004494000-memory.dmp

    Filesize

    144KB