Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19-10-2021 14:59
Static task
static1
Behavioral task
behavioral1
Sample
c1b4b9ffcd81e9a4516400f9fc38a4d3.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
c1b4b9ffcd81e9a4516400f9fc38a4d3.exe
Resource
win10-en-20210920
General
-
Target
c1b4b9ffcd81e9a4516400f9fc38a4d3.exe
-
Size
1.1MB
-
MD5
c1b4b9ffcd81e9a4516400f9fc38a4d3
-
SHA1
3605dec02e7f6480262eb5cae77ada772324bb2b
-
SHA256
4ed0b0474741e959230eb8a17efbc5e0db94fba7f46499596dd6359b4cf16637
-
SHA512
f7ff356b06b1eb2f9babc850727907748c50b5868a241a6b4746e92104d806c67b3034a73559a2ca0819c6e4b66e17e1bbcd856ba7ca4d16d3f283e827dd0c5e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.lko-import.de - Port:
587 - Username:
[email protected] - Password:
TVMHSiW5
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1492-66-0x0000000000310000-0x00000000008F9000-memory.dmp family_agenttesla behavioral1/memory/1492-67-0x00000000003475EE-mapping.dmp family_agenttesla behavioral1/memory/1492-68-0x0000000000310000-0x00000000008F9000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
Processes:
edootqca.pifpid process 1608 edootqca.pif -
Loads dropped DLL 4 IoCs
Processes:
c1b4b9ffcd81e9a4516400f9fc38a4d3.exepid process 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
edootqca.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run edootqca.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\75093774\\edootqca.pif c:\\75093774\\TTBFBS~1.MNA" edootqca.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
edootqca.pifdescription pid process target process PID 1608 set thread context of 1492 1608 edootqca.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
edootqca.pifRegSvcs.exepid process 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1608 edootqca.pif 1608 edootqca.pif 1492 RegSvcs.exe 1492 RegSvcs.exe 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif 1608 edootqca.pif -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 1492 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 1492 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
c1b4b9ffcd81e9a4516400f9fc38a4d3.exeedootqca.pifdescription pid process target process PID 1336 wrote to memory of 1608 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe edootqca.pif PID 1336 wrote to memory of 1608 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe edootqca.pif PID 1336 wrote to memory of 1608 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe edootqca.pif PID 1336 wrote to memory of 1608 1336 c1b4b9ffcd81e9a4516400f9fc38a4d3.exe edootqca.pif PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe PID 1608 wrote to memory of 1492 1608 edootqca.pif RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b4b9ffcd81e9a4516400f9fc38a4d3.exe"C:\Users\Admin\AppData\Local\Temp\c1b4b9ffcd81e9a4516400f9fc38a4d3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\75093774\edootqca.pif"C:\75093774\edootqca.pif" ttbfbsnkx.mna2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118
-
MD5
38939658603af998024840687166081f
SHA1bfdb8628c8a6c5e595a2c847bbeb756940a1e2a3
SHA2562094a89efd01e941414d28ac31122aea61b0a96979b943e1ea346a9f095afd14
SHA5128d00dfe951ab06f967d687788b0baed64cb6525f576025b8940234e6a6b5ae845171588d314a65bbebf9291c634092d457fafb44d6cce77e7b3149376226ce9e
-
MD5
1e9004bd0403298a96483c61e1e85995
SHA1bf9a6d9c00c43ea7b5054c04d0526c695a721e7d
SHA256a938ab1fd8cbf75992f1165d689911fffe0223479f6f2f6db8f34bb1bd83ebdd
SHA512c42f9a5c5c4af57b5d37b17ee87539a83926d0357b0079a42042f55a6a3eb5e34ac604dd3b766e951134eeb6e8fcec6094ed7d0ac82ab30338965523a2cda76d
-
MD5
e86bc8d921ac0b38387c090d249ca353
SHA19bf5800dbb9502c1e81e39a663de50f76b45da3a
SHA2567c5658d6106669337a112f20a48a5441deb54d5483a1624cd9c23b061c4a32b2
SHA51291a714c3911607a54e14fa2a009fc0324db4705bd6f07e7ba02ffaad8eae3b38b579a89aaa9f74c0e7211f1fc2addf5fc1042c7ff9adc58c5506f209bb97cf97
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118
-
MD5
1d7071dd5cda216508b235c0e2318b05
SHA10b972fbc1ea8a47204b2a187e608744a4e947bc2
SHA256788edeacd860a1a3bb22b839c1ecf408227e1e14bbe0b1baf55824075161f996
SHA51265965d2de629024773dddf5f8f37d40a15afc51cbaec48c8cda3b0763e9391e065c5ee6ab81b7f4e53ab1f531ef53bb9dccd9ddd4a1c9423922eebf37e544118