Analysis
-
max time kernel
151s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
19-10-2021 10:09
Static task
static1
Behavioral task
behavioral1
Sample
4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe
Resource
win10-en-20210920
General
-
Target
4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe
-
Size
1.1MB
-
MD5
c1b4b9ffcd81e9a4516400f9fc38a4d3
-
SHA1
3605dec02e7f6480262eb5cae77ada772324bb2b
-
SHA256
4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637
-
SHA512
f7ff356b06b1eb2f9babc850727907748c50b5868a241a6b4746e92104d806c67b3034a73559a2ca0819c6e4b66e17e1bbcd856ba7ca4d16d3f283e827dd0c5e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.lko-import.de - Port:
587 - Username:
[email protected] - Password:
TVMHSiW5
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-121-0x0000000000A30000-0x0000000000F9C000-memory.dmp family_agenttesla behavioral1/memory/2172-122-0x0000000000A675EE-mapping.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
Processes:
edootqca.pifpid process 3368 edootqca.pif -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
edootqca.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run edootqca.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\75093774\\edootqca.pif c:\\75093774\\TTBFBS~1.MNA" edootqca.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
edootqca.pifdescription pid process target process PID 3368 set thread context of 2172 3368 edootqca.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
RegSvcs.exeedootqca.pifpid process 2172 RegSvcs.exe 2172 RegSvcs.exe 2172 RegSvcs.exe 2172 RegSvcs.exe 3368 edootqca.pif 3368 edootqca.pif 2172 RegSvcs.exe 2172 RegSvcs.exe 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif 3368 edootqca.pif -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2172 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2172 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exeedootqca.pifdescription pid process target process PID 1720 wrote to memory of 3368 1720 4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe edootqca.pif PID 1720 wrote to memory of 3368 1720 4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe edootqca.pif PID 1720 wrote to memory of 3368 1720 4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe edootqca.pif PID 3368 wrote to memory of 2172 3368 edootqca.pif RegSvcs.exe PID 3368 wrote to memory of 2172 3368 edootqca.pif RegSvcs.exe PID 3368 wrote to memory of 2172 3368 edootqca.pif RegSvcs.exe PID 3368 wrote to memory of 2172 3368 edootqca.pif RegSvcs.exe PID 3368 wrote to memory of 2172 3368 edootqca.pif RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe"C:\Users\Admin\AppData\Local\Temp\4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\75093774\edootqca.pif"C:\75093774\edootqca.pif" ttbfbsnkx.mna2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118
-
MD5
38939658603af998024840687166081f
SHA1bfdb8628c8a6c5e595a2c847bbeb756940a1e2a3
SHA2562094a89efd01e941414d28ac31122aea61b0a96979b943e1ea346a9f095afd14
SHA5128d00dfe951ab06f967d687788b0baed64cb6525f576025b8940234e6a6b5ae845171588d314a65bbebf9291c634092d457fafb44d6cce77e7b3149376226ce9e
-
MD5
1e9004bd0403298a96483c61e1e85995
SHA1bf9a6d9c00c43ea7b5054c04d0526c695a721e7d
SHA256a938ab1fd8cbf75992f1165d689911fffe0223479f6f2f6db8f34bb1bd83ebdd
SHA512c42f9a5c5c4af57b5d37b17ee87539a83926d0357b0079a42042f55a6a3eb5e34ac604dd3b766e951134eeb6e8fcec6094ed7d0ac82ab30338965523a2cda76d
-
MD5
e86bc8d921ac0b38387c090d249ca353
SHA19bf5800dbb9502c1e81e39a663de50f76b45da3a
SHA2567c5658d6106669337a112f20a48a5441deb54d5483a1624cd9c23b061c4a32b2
SHA51291a714c3911607a54e14fa2a009fc0324db4705bd6f07e7ba02ffaad8eae3b38b579a89aaa9f74c0e7211f1fc2addf5fc1042c7ff9adc58c5506f209bb97cf97