Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
23-10-2021 10:17
Static task
static1
Behavioral task
behavioral1
Sample
Payment slip.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Payment slip.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
Payment slip.exe
-
Size
664KB
-
MD5
da1c1f2acf3ceaf318b88595c6fcd3e2
-
SHA1
c1b33299ce801bdf1ec02e5125dcb018a751c0e8
-
SHA256
e49f212d6e5f137cf1394c1bce43b0d84c1a982b0a52e43d27d8cd45692764b7
-
SHA512
21ba66ae3eb417f53a140a600dea660cdc6e951cac372a6993ebdde62ec61acecfa44589b9d9e4ecc61eefe87bb05c3fdee29e1dfec44ba45f39ea5a69b860c9
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Everest10
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-59-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1528-60-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1528-61-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1528-62-0x0000000000436D3E-mapping.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment slip.exedescription pid process target process PID 852 set thread context of 1528 852 Payment slip.exe Payment slip.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Payment slip.exePayment slip.exedescription pid process target process PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 852 wrote to memory of 1528 852 Payment slip.exe Payment slip.exe PID 1528 wrote to memory of 1372 1528 Payment slip.exe dw20.exe PID 1528 wrote to memory of 1372 1528 Payment slip.exe dw20.exe PID 1528 wrote to memory of 1372 1528 Payment slip.exe dw20.exe PID 1528 wrote to memory of 1372 1528 Payment slip.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment slip.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3963⤵PID:1372
-
-