Analysis

  • max time kernel
    136s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    19-10-2021 05:47

General

  • Target

    PAYMEN~0.SCR

  • Size

    92KB

  • MD5

    fd8a66ce8c50c375cca9bd9b5408e173

  • SHA1

    ef344ca7340100a9cc1ec8049fcdaafad9b70422

  • SHA256

    1018aa0f641a722fc61ac3135050ab53f6562f6050b40c679d02b2f8b745960f

  • SHA512

    73b0c9e8f53b24eef223e4565cee232f94f4ee4df61836e734793cb534ae3a4cb8ef72b2febdb8fbefedb173f3a9ca5355bba9512d1825eea980652030456a4b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tccinfaes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TccBps1427log

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • AgentTesla Payload 1 IoCs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR
    "C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S
    1⤵
    • Checks QEMU agent file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
      "C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S
      2⤵
        PID:472
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        "C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S
        2⤵
          PID:516
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
          "C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S
          2⤵
            PID:1396
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
            "C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S
            2⤵
              PID:1476
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
              "C:\Users\Admin\AppData\Local\Temp\PAYMEN~0.SCR" /S
              2⤵
              • Checks QEMU agent file
              • Accesses Microsoft Outlook profiles
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:572

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Collection

          Email Collection

          1
          T1114

          Command and Control

          Web Service

          1
          T1102

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/572-70-0x0000000000210000-0x0000000000310000-memory.dmp
            Filesize

            1024KB

          • memory/572-79-0x000000001DBF1000-0x000000001DBF2000-memory.dmp
            Filesize

            4KB

          • memory/572-78-0x000000001DBF0000-0x000000001DBF1000-memory.dmp
            Filesize

            4KB

          • memory/572-76-0x0000000000400000-0x0000000000401000-memory.dmp
            Filesize

            4KB

          • memory/572-75-0x0000000000400000-0x0000000000553000-memory.dmp
            Filesize

            1.3MB

          • memory/572-74-0x0000000077370000-0x00000000774F0000-memory.dmp
            Filesize

            1.5MB

          • memory/572-66-0x0000000000FD768E-mapping.dmp
          • memory/572-73-0x0000000077190000-0x0000000077339000-memory.dmp
            Filesize

            1.7MB

          • memory/1416-59-0x0000000077190000-0x0000000077339000-memory.dmp
            Filesize

            1.7MB

          • memory/1416-67-0x0000000077370000-0x00000000774F0000-memory.dmp
            Filesize

            1.5MB

          • memory/1416-69-0x0000000077370000-0x00000000774F0000-memory.dmp
            Filesize

            1.5MB

          • memory/1416-68-0x0000000077370000-0x00000000774F0000-memory.dmp
            Filesize

            1.5MB

          • memory/1416-60-0x0000000077370000-0x00000000774F0000-memory.dmp
            Filesize

            1.5MB

          • memory/1416-54-0x0000000000220000-0x0000000000226000-memory.dmp
            Filesize

            24KB

          • memory/1416-58-0x0000000075951000-0x0000000075953000-memory.dmp
            Filesize

            8KB

          • memory/1416-56-0x00000000003D0000-0x00000000003E1000-memory.dmp
            Filesize

            68KB

          • memory/1416-55-0x0000000000220000-0x000000000022A000-memory.dmp
            Filesize

            40KB