Analysis
-
max time kernel
136s -
max time network
169s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
19-10-2021 05:47
Static task
static1
Behavioral task
behavioral1
Sample
PAYMEN~0.SCR
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PAYMEN~0.SCR
Resource
win10-en-20210920
General
-
Target
PAYMEN~0.SCR
-
Size
92KB
-
MD5
fd8a66ce8c50c375cca9bd9b5408e173
-
SHA1
ef344ca7340100a9cc1ec8049fcdaafad9b70422
-
SHA256
1018aa0f641a722fc61ac3135050ab53f6562f6050b40c679d02b2f8b745960f
-
SHA512
73b0c9e8f53b24eef223e4565cee232f94f4ee4df61836e734793cb534ae3a4cb8ef72b2febdb8fbefedb173f3a9ca5355bba9512d1825eea980652030456a4b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tccinfaes.com - Port:
587 - Username:
[email protected] - Password:
TccBps1427log
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/572-75-0x0000000000400000-0x0000000000553000-memory.dmp family_agenttesla -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
PAYMEN~0.SCRcaspol.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe PAYMEN~0.SCR File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe caspol.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
caspol.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 caspol.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
caspol.exepid process 572 caspol.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
PAYMEN~0.SCRcaspol.exepid process 1416 PAYMEN~0.SCR 572 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PAYMEN~0.SCRdescription pid process target process PID 1416 set thread context of 572 1416 PAYMEN~0.SCR caspol.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
caspol.exepid process 572 caspol.exe 572 caspol.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PAYMEN~0.SCRpid process 1416 PAYMEN~0.SCR 1416 PAYMEN~0.SCR 1416 PAYMEN~0.SCR 1416 PAYMEN~0.SCR 1416 PAYMEN~0.SCR -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
caspol.exedescription pid process Token: SeDebugPrivilege 572 caspol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
PAYMEN~0.SCRpid process 1416 PAYMEN~0.SCR -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
PAYMEN~0.SCRdescription pid process target process PID 1416 wrote to memory of 472 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 472 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 472 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 472 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 516 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 516 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 516 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 516 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1396 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1396 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1396 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1396 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1476 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1476 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1476 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 1476 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 572 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 572 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 572 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 572 1416 PAYMEN~0.SCR caspol.exe PID 1416 wrote to memory of 572 1416 PAYMEN~0.SCR caspol.exe -
outlook_office_path 1 IoCs
Processes:
caspol.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 caspol.exe -
outlook_win_path 1 IoCs
Processes:
caspol.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 caspol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR"C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S1⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S2⤵PID:472
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S2⤵PID:516
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S2⤵PID:1396
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S2⤵PID:1476
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S2⤵
- Checks QEMU agent file
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:572