Analysis
-
max time kernel
138s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
23-10-2021 08:37
Static task
static1
Behavioral task
behavioral1
Sample
e3b43833.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
e3b43833.exe
Resource
win10-en-20211014
General
-
Target
e3b43833.exe
-
Size
800KB
-
MD5
c2ce115eece7c53ec5b202a0bd4d1778
-
SHA1
8cbb0836da268c35d2ad2691edaa4252134e21af
-
SHA256
e3b438339a4ce2dba793223d9448b8c597080daaaf63bdd94a79079b78cf2fcf
-
SHA512
a1c377449ce676685d30cc5f2cb3fb8c5d78d4c63986003ecc78fae5f2e8c8a77393c03c8bdd83a542a38ba204c297ffc2e9ca74f68424d2cedd71117a462e81
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.penavico--cz.com - Port:
587 - Username:
ops@penavico--cz.com - Password:
Fq$L%J((!6
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/608-129-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/608-130-0x0000000000436A8E-mapping.dmp family_agenttesla -
Nirsoft 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 3232 AdvancedRun.exe 1872 AdvancedRun.exe 3428 AdvancedRun.exe 1420 AdvancedRun.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
e3b43833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e3b43833.exedescription pid process target process PID 3812 set thread context of 608 3812 e3b43833.exe e3b43833.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exee3b43833.exepid process 3812 e3b43833.exe 3232 AdvancedRun.exe 3232 AdvancedRun.exe 3232 AdvancedRun.exe 3232 AdvancedRun.exe 1872 AdvancedRun.exe 1872 AdvancedRun.exe 1872 AdvancedRun.exe 1872 AdvancedRun.exe 3428 AdvancedRun.exe 3428 AdvancedRun.exe 3428 AdvancedRun.exe 3428 AdvancedRun.exe 1420 AdvancedRun.exe 1420 AdvancedRun.exe 1420 AdvancedRun.exe 1420 AdvancedRun.exe 3812 e3b43833.exe 3812 e3b43833.exe 608 e3b43833.exe 608 e3b43833.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exee3b43833.exedescription pid process Token: SeDebugPrivilege 3812 e3b43833.exe Token: SeDebugPrivilege 3232 AdvancedRun.exe Token: SeImpersonatePrivilege 3232 AdvancedRun.exe Token: SeDebugPrivilege 1872 AdvancedRun.exe Token: SeImpersonatePrivilege 1872 AdvancedRun.exe Token: SeDebugPrivilege 3428 AdvancedRun.exe Token: SeImpersonatePrivilege 3428 AdvancedRun.exe Token: SeDebugPrivilege 1420 AdvancedRun.exe Token: SeImpersonatePrivilege 1420 AdvancedRun.exe Token: SeDebugPrivilege 608 e3b43833.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
e3b43833.exeAdvancedRun.exeAdvancedRun.exedescription pid process target process PID 3812 wrote to memory of 3232 3812 e3b43833.exe AdvancedRun.exe PID 3812 wrote to memory of 3232 3812 e3b43833.exe AdvancedRun.exe PID 3812 wrote to memory of 3232 3812 e3b43833.exe AdvancedRun.exe PID 3232 wrote to memory of 1872 3232 AdvancedRun.exe AdvancedRun.exe PID 3232 wrote to memory of 1872 3232 AdvancedRun.exe AdvancedRun.exe PID 3232 wrote to memory of 1872 3232 AdvancedRun.exe AdvancedRun.exe PID 3812 wrote to memory of 3428 3812 e3b43833.exe AdvancedRun.exe PID 3812 wrote to memory of 3428 3812 e3b43833.exe AdvancedRun.exe PID 3812 wrote to memory of 3428 3812 e3b43833.exe AdvancedRun.exe PID 3428 wrote to memory of 1420 3428 AdvancedRun.exe AdvancedRun.exe PID 3428 wrote to memory of 1420 3428 AdvancedRun.exe AdvancedRun.exe PID 3428 wrote to memory of 1420 3428 AdvancedRun.exe AdvancedRun.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe PID 3812 wrote to memory of 608 3812 e3b43833.exe e3b43833.exe -
outlook_office_path 1 IoCs
Processes:
e3b43833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe -
outlook_win_path 1 IoCs
Processes:
e3b43833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e3b43833.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3b43833.exe"C:\Users\Admin\AppData\Local\Temp\e3b43833.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 32323⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 34283⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\e3b43833.exeC:\Users\Admin\AppData\Local\Temp\e3b43833.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e3b43833.exe.logMD5
605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
memory/608-135-0x0000000005690000-0x0000000005691000-memory.dmpFilesize
4KB
-
memory/608-129-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/608-130-0x0000000000436A8E-mapping.dmp
-
memory/608-140-0x0000000001370000-0x0000000001371000-memory.dmpFilesize
4KB
-
memory/608-139-0x0000000006630000-0x0000000006631000-memory.dmpFilesize
4KB
-
memory/608-138-0x0000000006230000-0x0000000006231000-memory.dmpFilesize
4KB
-
memory/608-137-0x0000000006190000-0x0000000006191000-memory.dmpFilesize
4KB
-
memory/608-134-0x0000000005A30000-0x0000000005A31000-memory.dmpFilesize
4KB
-
memory/608-136-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/1420-127-0x0000000000000000-mapping.dmp
-
memory/1872-123-0x0000000000000000-mapping.dmp
-
memory/3232-119-0x0000000000000000-mapping.dmp
-
memory/3428-125-0x0000000000000000-mapping.dmp
-
memory/3812-115-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/3812-121-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/3812-118-0x0000000002A60000-0x0000000002A84000-memory.dmpFilesize
144KB
-
memory/3812-117-0x0000000005050000-0x00000000050EB000-memory.dmpFilesize
620KB