Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    18-10-2021 09:35

General

  • Target

    PAYMENT_COPY_ HSBC BANK_Pdf.exe

  • Size

    38KB

  • MD5

    98c0e8ae038031c7f5f210119c1b0b36

  • SHA1

    e63bb6d9ebe904e805f93f86dba97f6eeb6a5cef

  • SHA256

    f090ea218b1b9efedee6bae4665c1066649dc0fb94542467a56ae5a0a2c693e0

  • SHA512

    951259982fec7ccb4bcdaf4993e85f89ac041f28bd1150616ae59e983b91b5565610d379016a920df7465c7721c41e509802b298eab61e1446b9d47fc84b8e3d

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.meyaargroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Meyaar@123$

Extracted

Family

limerat

Wallets

3AtEv1cfnjjwnaXZKwxd8fV5xh2sx5qNob

Attributes
  • aes_key

    NYANCAT

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/rmZm7wcd

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    575756.exe

  • main_folder

    Temp

  • pin_spread

    true

  • sub_folder

    \windows\

  • usb_spread

    true

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • AgentTesla Payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Egogfy.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe
        "C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe"
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious use of WriteProcessMemory
        PID:184
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\windows\575756.exe'"
          4⤵
          • Creates scheduled task(s)
          PID:1420
        • C:\Users\Admin\AppData\Local\Temp\windows\575756.exe
          "C:\Users\Admin\AppData\Local\Temp\windows\575756.exe"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
    • C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\PAYMENT_COPY_ HSBC BANK_Pdf.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Egogfy.vbs

    MD5

    d33af38996d004b235e5c66c04f10d66

    SHA1

    839e50184c2f6e0c6265ebf31f9fb8653ce612b9

    SHA256

    099ea74f33ed5807c65d1ab8f807627841710abae6daf5250527af3fff38555a

    SHA512

    92ee494c32077558f3746d31e1d0e844941f4995ff1fbfbd0f3899a27568d58d2a48b76be698cce8cf8054af34ab774d0f2604b03f00db7ca4b76b0888402ebf

  • C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • C:\Users\Admin\AppData\Local\Temp\Evaexshoaoctfomtnblime raw file_ok.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • C:\Users\Admin\AppData\Local\Temp\windows\575756.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • C:\Users\Admin\AppData\Local\Temp\windows\575756.exe

    MD5

    626dfbde436ca2d66c710da8f1d6722c

    SHA1

    b1f3052ef3d8acc4911328bee060a9f4df220c6c

    SHA256

    c84782e66c1a3f6ce2982375014caf93e1a60ddeb56c8c1a1a7e5e4ddcdd89c3

    SHA512

    58f09f1e54330e3e9af94f446a558e372f7b503ce2caef370ac3e8d8f67b3e0d03f75476f6f4c7ee748ee19d8c8c6eefafee8566df6c8ff8e8b2c1f306ed1715

  • memory/184-129-0x00000000008A0000-0x00000000008A1000-memory.dmp

    Filesize

    4KB

  • memory/184-136-0x0000000005020000-0x0000000005021000-memory.dmp

    Filesize

    4KB

  • memory/184-135-0x00000000051D0000-0x00000000051D1000-memory.dmp

    Filesize

    4KB

  • memory/184-132-0x0000000005130000-0x0000000005131000-memory.dmp

    Filesize

    4KB

  • memory/184-125-0x0000000000000000-mapping.dmp

  • memory/920-119-0x0000000000000000-mapping.dmp

  • memory/1240-131-0x0000000005D80000-0x0000000005D81000-memory.dmp

    Filesize

    4KB

  • memory/1240-137-0x0000000005D20000-0x0000000005D21000-memory.dmp

    Filesize

    4KB

  • memory/1240-122-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1240-134-0x0000000005860000-0x0000000005861000-memory.dmp

    Filesize

    4KB

  • memory/1240-124-0x0000000000436D0E-mapping.dmp

  • memory/1240-154-0x0000000001630000-0x0000000001631000-memory.dmp

    Filesize

    4KB

  • memory/1420-140-0x0000000000000000-mapping.dmp

  • memory/1700-141-0x0000000000000000-mapping.dmp

  • memory/1700-148-0x0000000004D30000-0x0000000004D31000-memory.dmp

    Filesize

    4KB

  • memory/1700-150-0x0000000005E80000-0x0000000005E81000-memory.dmp

    Filesize

    4KB

  • memory/1700-151-0x00000000070B0000-0x00000000070C6000-memory.dmp

    Filesize

    88KB

  • memory/1700-152-0x00000000070D0000-0x00000000070EC000-memory.dmp

    Filesize

    112KB

  • memory/2416-115-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/2416-118-0x00000000059E0000-0x0000000005AD1000-memory.dmp

    Filesize

    964KB

  • memory/2416-117-0x0000000002800000-0x0000000002801000-memory.dmp

    Filesize

    4KB

  • memory/2416-121-0x0000000005F00000-0x0000000005F24000-memory.dmp

    Filesize

    144KB