Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-12-2021 14:21
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENT.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DOCUMENT.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
DOCUMENT.exe
-
Size
488KB
-
MD5
6812d384da2903359c89789715573971
-
SHA1
ecf388668fad2da58eb805383052cf4edece649d
-
SHA256
925c73a3df8d17a05c817d9b19d8dafeeaf208f23de3f8087107372d529076ab
-
SHA512
16c8c092e788829a54bb824bb2ab223056e38fef240c734bdf225a893b69104cc4506014ca2d5040b1f11567ce908ca65398f3efeb344047535ddb93741e2a52
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.scsgroups.com - Port:
587 - Username:
[email protected] - Password:
Scs@looi1007
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3924-124-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3924-125-0x000000000043763E-mapping.dmp family_agenttesla behavioral2/memory/3924-130-0x0000000005570000-0x0000000005A6E000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\kprUEGC = "C:\\Users\\Admin\\AppData\\Roaming\\kprUEGC\\kprUEGC.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DOCUMENT.exedescription pid process target process PID 4056 set thread context of 3924 4056 DOCUMENT.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DOCUMENT.exeRegSvcs.exepid process 4056 DOCUMENT.exe 4056 DOCUMENT.exe 4056 DOCUMENT.exe 4056 DOCUMENT.exe 4056 DOCUMENT.exe 4056 DOCUMENT.exe 3924 RegSvcs.exe 3924 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DOCUMENT.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4056 DOCUMENT.exe Token: SeDebugPrivilege 3924 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 3924 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
DOCUMENT.exedescription pid process target process PID 4056 wrote to memory of 1552 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 1552 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 1552 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3892 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3892 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3892 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe PID 4056 wrote to memory of 3924 4056 DOCUMENT.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\DOCUMENT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1552
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3892
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3924