Analysis
-
max time kernel
135s -
max time network
101s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
25-10-2021 12:40
Static task
static1
Behavioral task
behavioral1
Sample
PDA.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
PDA.exe
Resource
win10-en-20211014
General
-
Target
PDA.exe
-
Size
963KB
-
MD5
378d5f97d0e28d2ead7fed9dc4abb798
-
SHA1
72370ce75aaf466bc048e00a108ecb8126ffc80b
-
SHA256
780de7b808b5dba8e6ef57a82e264dcbbbdc2f63de3ef6683c8627bd177c5103
-
SHA512
0bceb95865026c1d9d8fe0df72760acbaf5c5729f11652cd9c8469076f07264545fe08519c45a2d020b99e5ddb2a43fff8a3e04e51bfb7bc0d055d79b415afa4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
webmail.fllid.com - Port:
587 - Username:
[email protected] - Password:
ImbangFll
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1068-67-0x0000000000400000-0x0000000000470000-memory.dmp family_agenttesla behavioral1/memory/1068-70-0x00000000004379FE-mapping.dmp family_agenttesla behavioral1/memory/1068-68-0x0000000000400000-0x0000000000470000-memory.dmp family_agenttesla behavioral1/memory/1068-69-0x0000000000400000-0x0000000000470000-memory.dmp family_agenttesla behavioral1/memory/1068-71-0x0000000000400000-0x0000000000470000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\HjYArO = "C:\\Users\\Admin\\AppData\\Roaming\\HjYArO\\HjYArO.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PDA.exedescription pid process target process PID 524 set thread context of 1068 524 PDA.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
PDA.exeRegSvcs.exepid process 524 PDA.exe 1068 RegSvcs.exe 1068 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PDA.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 524 PDA.exe Token: SeDebugPrivilege 1068 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
PDA.exepid process 524 PDA.exe 524 PDA.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
PDA.exedescription pid process target process PID 524 wrote to memory of 1596 524 PDA.exe schtasks.exe PID 524 wrote to memory of 1596 524 PDA.exe schtasks.exe PID 524 wrote to memory of 1596 524 PDA.exe schtasks.exe PID 524 wrote to memory of 1596 524 PDA.exe schtasks.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe PID 524 wrote to memory of 1068 524 PDA.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDA.exe"C:\Users\Admin\AppData\Local\Temp\PDA.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fChjuz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF2BD.tmp"2⤵
- Creates scheduled task(s)
PID:1596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6b7017b52e5308bc5b57b2d477866cdb
SHA1cdc33403e552935c42e6cef825f439d8cc8174f2
SHA256aaab9fcd51be22ff4bf7ca996e52884fa22e873704e51b02c1da8b47be0ebb3f
SHA512342e3884107ac5243211cd8a2e1e8771fa0c0756872e13127b7bb00483fced87c9f4b3236907f02c5a6257b9b98a21bd511a2a425df52a4807975d4f997ee762