Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
23-10-2021 08:37
Static task
static1
Behavioral task
behavioral1
Sample
e3b43833.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
e3b43833.exe
Resource
win10-en-20211014
General
-
Target
e3b43833.exe
-
Size
800KB
-
MD5
c2ce115eece7c53ec5b202a0bd4d1778
-
SHA1
8cbb0836da268c35d2ad2691edaa4252134e21af
-
SHA256
e3b438339a4ce2dba793223d9448b8c597080daaaf63bdd94a79079b78cf2fcf
-
SHA512
a1c377449ce676685d30cc5f2cb3fb8c5d78d4c63986003ecc78fae5f2e8c8a77393c03c8bdd83a542a38ba204c297ffc2e9ca74f68424d2cedd71117a462e81
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.penavico--cz.com - Port:
587 - Username:
ops@penavico--cz.com - Password:
Fq$L%J((!6
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1556-82-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1556-83-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1556-84-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1556-85-0x0000000000436A8E-mapping.dmp family_agenttesla behavioral1/memory/1556-86-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Nirsoft 13 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 564 AdvancedRun.exe 1624 AdvancedRun.exe 812 AdvancedRun.exe 1872 AdvancedRun.exe -
Loads dropped DLL 8 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exepid process 1920 e3b43833.exe 1920 e3b43833.exe 564 AdvancedRun.exe 564 AdvancedRun.exe 1920 e3b43833.exe 1920 e3b43833.exe 812 AdvancedRun.exe 812 AdvancedRun.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
e3b43833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e3b43833.exedescription pid process target process PID 1920 set thread context of 1556 1920 e3b43833.exe e3b43833.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exee3b43833.exepid process 1920 e3b43833.exe 564 AdvancedRun.exe 564 AdvancedRun.exe 1624 AdvancedRun.exe 1624 AdvancedRun.exe 812 AdvancedRun.exe 812 AdvancedRun.exe 1872 AdvancedRun.exe 1872 AdvancedRun.exe 1920 e3b43833.exe 1556 e3b43833.exe 1556 e3b43833.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exee3b43833.exedescription pid process Token: SeDebugPrivilege 1920 e3b43833.exe Token: SeDebugPrivilege 564 AdvancedRun.exe Token: SeImpersonatePrivilege 564 AdvancedRun.exe Token: SeDebugPrivilege 1624 AdvancedRun.exe Token: SeImpersonatePrivilege 1624 AdvancedRun.exe Token: SeDebugPrivilege 812 AdvancedRun.exe Token: SeImpersonatePrivilege 812 AdvancedRun.exe Token: SeDebugPrivilege 1872 AdvancedRun.exe Token: SeImpersonatePrivilege 1872 AdvancedRun.exe Token: SeDebugPrivilege 1556 e3b43833.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exedescription pid process target process PID 1920 wrote to memory of 564 1920 e3b43833.exe AdvancedRun.exe PID 1920 wrote to memory of 564 1920 e3b43833.exe AdvancedRun.exe PID 1920 wrote to memory of 564 1920 e3b43833.exe AdvancedRun.exe PID 1920 wrote to memory of 564 1920 e3b43833.exe AdvancedRun.exe PID 564 wrote to memory of 1624 564 AdvancedRun.exe AdvancedRun.exe PID 564 wrote to memory of 1624 564 AdvancedRun.exe AdvancedRun.exe PID 564 wrote to memory of 1624 564 AdvancedRun.exe AdvancedRun.exe PID 564 wrote to memory of 1624 564 AdvancedRun.exe AdvancedRun.exe PID 1920 wrote to memory of 812 1920 e3b43833.exe AdvancedRun.exe PID 1920 wrote to memory of 812 1920 e3b43833.exe AdvancedRun.exe PID 1920 wrote to memory of 812 1920 e3b43833.exe AdvancedRun.exe PID 1920 wrote to memory of 812 1920 e3b43833.exe AdvancedRun.exe PID 812 wrote to memory of 1872 812 AdvancedRun.exe AdvancedRun.exe PID 812 wrote to memory of 1872 812 AdvancedRun.exe AdvancedRun.exe PID 812 wrote to memory of 1872 812 AdvancedRun.exe AdvancedRun.exe PID 812 wrote to memory of 1872 812 AdvancedRun.exe AdvancedRun.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe PID 1920 wrote to memory of 1556 1920 e3b43833.exe e3b43833.exe -
outlook_office_path 1 IoCs
Processes:
e3b43833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe -
outlook_win_path 1 IoCs
Processes:
e3b43833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3b43833.exe"C:\Users\Admin\AppData\Local\Temp\e3b43833.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 5643⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 8123⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\e3b43833.exeC:\Users\Admin\AppData\Local\Temp\e3b43833.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
memory/564-62-0x0000000076961000-0x0000000076963000-memory.dmpFilesize
8KB
-
memory/564-60-0x0000000000000000-mapping.dmp
-
memory/812-72-0x0000000000000000-mapping.dmp
-
memory/1556-83-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1556-84-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1556-88-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB
-
memory/1556-86-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1556-85-0x0000000000436A8E-mapping.dmp
-
memory/1556-82-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1556-80-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1556-81-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1624-67-0x0000000000000000-mapping.dmp
-
memory/1872-77-0x0000000000000000-mapping.dmp
-
memory/1920-56-0x00000000048D0000-0x000000000496B000-memory.dmpFilesize
620KB
-
memory/1920-63-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/1920-57-0x00000000005C0000-0x00000000005E4000-memory.dmpFilesize
144KB
-
memory/1920-54-0x0000000000D70000-0x0000000000D71000-memory.dmpFilesize
4KB