Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
25-10-2021 04:05
Static task
static1
Behavioral task
behavioral1
Sample
Bill_of_Landing_966812774.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Bill_of_Landing_966812774.exe
Resource
win10-en-20211014
General
-
Target
Bill_of_Landing_966812774.exe
-
Size
706KB
-
MD5
cbe0221a37b521da04281f9beafcaf0b
-
SHA1
6d9236b0c09a643daa2a021414800556e10d7ac0
-
SHA256
e64bdf29134cd20eded8e2208b56ef6c808617d30c2bb625211ea7d3aa0c5997
-
SHA512
1b4c85cb1308bef28e7b8ea34424592d7cdef6ec990f1ef8f105bafb88bab51976904d45c7325177247ea704fd6264d80093a98e27e6ca34b3ccc0ca564a9f2d
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cubasa.com.mx - Port:
587 - Username:
[email protected] - Password:
Almacen.1732312
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1320-65-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1320-64-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1320-66-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1320-67-0x000000000043777E-mapping.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bill_of_Landing_966812774.exedescription pid process target process PID 1876 set thread context of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Bill_of_Landing_966812774.exeBill_of_Landing_966812774.exepid process 1876 Bill_of_Landing_966812774.exe 1876 Bill_of_Landing_966812774.exe 1320 Bill_of_Landing_966812774.exe 1320 Bill_of_Landing_966812774.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dw20.exepid process 1948 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bill_of_Landing_966812774.exeBill_of_Landing_966812774.exedescription pid process Token: SeDebugPrivilege 1876 Bill_of_Landing_966812774.exe Token: SeDebugPrivilege 1320 Bill_of_Landing_966812774.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Bill_of_Landing_966812774.exepid process 1876 Bill_of_Landing_966812774.exe 1876 Bill_of_Landing_966812774.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Bill_of_Landing_966812774.exeBill_of_Landing_966812774.exedescription pid process target process PID 1876 wrote to memory of 1152 1876 Bill_of_Landing_966812774.exe schtasks.exe PID 1876 wrote to memory of 1152 1876 Bill_of_Landing_966812774.exe schtasks.exe PID 1876 wrote to memory of 1152 1876 Bill_of_Landing_966812774.exe schtasks.exe PID 1876 wrote to memory of 1152 1876 Bill_of_Landing_966812774.exe schtasks.exe PID 1876 wrote to memory of 1196 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1196 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1196 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1196 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1876 wrote to memory of 1320 1876 Bill_of_Landing_966812774.exe Bill_of_Landing_966812774.exe PID 1320 wrote to memory of 1948 1320 Bill_of_Landing_966812774.exe dw20.exe PID 1320 wrote to memory of 1948 1320 Bill_of_Landing_966812774.exe dw20.exe PID 1320 wrote to memory of 1948 1320 Bill_of_Landing_966812774.exe dw20.exe PID 1320 wrote to memory of 1948 1320 Bill_of_Landing_966812774.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bill_of_Landing_966812774.exe"C:\Users\Admin\AppData\Local\Temp\Bill_of_Landing_966812774.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wqEBplAX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6869.tmp"2⤵
- Creates scheduled task(s)
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\Bill_of_Landing_966812774.exe"{path}"2⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\Bill_of_Landing_966812774.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5203⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1948
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
cdba36d2a3cfddc61b7a39f3386a1f92
SHA1b8d63a204e3a461a8136d84720271a2115784cd4
SHA256b54459e0a51943a20d89dfb7269e973be3fe24881764c77120b8a36fa57025bd
SHA5122c6e503029aa56d7da6c5473c6789673166c5de71148e9182cee9b304c079c324116317c803444effcb8e749fd511fc6aa79395babb60bb0e16d3b9df48302eb