Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
20-10-2021 06:37
Static task
static1
Behavioral task
behavioral1
Sample
Payment Swift Copy_ HSBC Global Banking_pdf.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Payment Swift Copy_ HSBC Global Banking_pdf.exe
Resource
win10-en-20210920
General
-
Target
Payment Swift Copy_ HSBC Global Banking_pdf.exe
-
Size
38KB
-
MD5
491242d9d061272e2a96f1ae06273105
-
SHA1
59d6973a36a5d9afbf5bdc2edb9e257eba288e50
-
SHA256
484f86d608111d29c70a1bb0f456e3e4bfa942d71eeac1e049a15d4439f29b49
-
SHA512
acaef7c16dda93e213c55b61862db288034afed4940dd2ccd310f954408a3314326c708c4dc8f8924648b6a181eaf0e2128e135f6047554ef6fe2d2c60fbca31
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.meyaargroup.com - Port:
587 - Username:
[email protected] - Password:
Meyaar@123$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1472-62-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1472-63-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1472-64-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1472-65-0x0000000000436D0E-mapping.dmp family_agenttesla behavioral1/memory/1472-66-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Swift Copy_ HSBC Global Banking_pdf.exedescription pid process target process PID 1764 set thread context of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Payment Swift Copy_ HSBC Global Banking_pdf.exePayment Swift Copy_ HSBC Global Banking_pdf.exepid process 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe 1472 Payment Swift Copy_ HSBC Global Banking_pdf.exe 1472 Payment Swift Copy_ HSBC Global Banking_pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Swift Copy_ HSBC Global Banking_pdf.exePayment Swift Copy_ HSBC Global Banking_pdf.exedescription pid process Token: SeDebugPrivilege 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Token: SeDebugPrivilege 1472 Payment Swift Copy_ HSBC Global Banking_pdf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Payment Swift Copy_ HSBC Global Banking_pdf.exedescription pid process target process PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe PID 1764 wrote to memory of 1472 1764 Payment Swift Copy_ HSBC Global Banking_pdf.exe Payment Swift Copy_ HSBC Global Banking_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Swift Copy_ HSBC Global Banking_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Swift Copy_ HSBC Global Banking_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment Swift Copy_ HSBC Global Banking_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Swift Copy_ HSBC Global Banking_pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1472-64-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1472-60-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1472-61-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1472-62-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1472-63-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1472-65-0x0000000000436D0E-mapping.dmp
-
memory/1472-66-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1472-68-0x0000000002160000-0x0000000002161000-memory.dmpFilesize
4KB
-
memory/1764-56-0x0000000075B71000-0x0000000075B73000-memory.dmpFilesize
8KB
-
memory/1764-57-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB
-
memory/1764-58-0x0000000004650000-0x000000000469A000-memory.dmpFilesize
296KB
-
memory/1764-59-0x0000000000AB0000-0x0000000000AD4000-memory.dmpFilesize
144KB
-
memory/1764-54-0x0000000000AF0000-0x0000000000AF1000-memory.dmpFilesize
4KB