Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 20:17
Static task
static1
Behavioral task
behavioral1
Sample
UPDATED DN.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
UPDATED DN.exe
Resource
win10-en-20211014
General
-
Target
UPDATED DN.exe
-
Size
928KB
-
MD5
c0059f77c623451c9b85287c735df32f
-
SHA1
e1dcab797de118082168f787835e67324cca9b7a
-
SHA256
feb91cde2c89cdf45cd078485f4f98683c11ec7d5a044a73968d31c2dcaa7e81
-
SHA512
86728230a7835b7ca1a0df7e5f78d3ac25071c88146d39513bc5f9f4bfd1684476ece1df33169a3ac7f4313b427a8bd4890cbd2316aacb86522f26049e979167
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.manlogistics.in - Port:
587 - Username:
dilip.somkuwar@manlogistics.in - Password:
Ma&*$367Jhn
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2968-119-0x0000000000400000-0x000000000047E000-memory.dmp family_agenttesla behavioral2/memory/2968-120-0x00000000004376FE-mapping.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
UPDATED DN.exedescription pid process target process PID 3984 set thread context of 2968 3984 UPDATED DN.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dw20.exepid process 2812 dw20.exe 2812 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 2812 dw20.exe Token: SeBackupPrivilege 2812 dw20.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
UPDATED DN.exeRegSvcs.exedescription pid process target process PID 3984 wrote to memory of 3872 3984 UPDATED DN.exe schtasks.exe PID 3984 wrote to memory of 3872 3984 UPDATED DN.exe schtasks.exe PID 3984 wrote to memory of 3872 3984 UPDATED DN.exe schtasks.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 3984 wrote to memory of 2968 3984 UPDATED DN.exe RegSvcs.exe PID 2968 wrote to memory of 2812 2968 RegSvcs.exe dw20.exe PID 2968 wrote to memory of 2812 2968 RegSvcs.exe dw20.exe PID 2968 wrote to memory of 2812 2968 RegSvcs.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UPDATED DN.exe"C:\Users\Admin\AppData\Local\Temp\UPDATED DN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xwUnvexrqIZOUN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8681.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7083⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8681.tmpMD5
643dead05af530421457eea83bd4f035
SHA184ce47a071e078a58f115ba3349889a013dace27
SHA256d42b44d035dde6bcb55921894b41220833790509bdfabc08efd864a819ec3709
SHA51217c2a2c9315eb43a2eedf7d948d3fb5ddf915fd55d85fe5b608d879e1365f36f7cc8852bdbd725abea02d9a8a819bdfaaa903bd2f4fd8ed73ee9074bf3ab338e
-
memory/2812-121-0x0000000000000000-mapping.dmp
-
memory/2968-119-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/2968-120-0x00000000004376FE-mapping.dmp
-
memory/2968-122-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/3872-117-0x0000000000000000-mapping.dmp
-
memory/3984-115-0x0000000002770000-0x0000000002771000-memory.dmpFilesize
4KB
-
memory/3984-116-0x0000000002772000-0x0000000002774000-memory.dmpFilesize
8KB