Analysis
-
max time kernel
155s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-12-2021 14:33
Static task
static1
Behavioral task
behavioral1
Sample
Bank Slip.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
Bank Slip.exe
Resource
win10-en-20211014
General
-
Target
Bank Slip.exe
-
Size
609KB
-
MD5
23415766fdffe2d1e3df520326e3326c
-
SHA1
e1d773dbd8164c620b926d1f9bcfde9910840b8b
-
SHA256
2cf586182f56dcc1131459031b5dca2b6c3037f5c8bc39b70ab226972b5d3d9d
-
SHA512
2ab7d544257ecacbad91e5185d8e087728d9d3ffda3300458a6f82720743c1eddad3b55bc51f2d8c015dc0cfabab5ff676ebc36612f4187f64f1be0c018061d0
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.waterchem.com.tr - Port:
587 - Username:
[email protected] - Password:
Q]b9[cc7kHK&
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2132-124-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/2132-125-0x00000000004377AE-mapping.dmp family_agenttesla behavioral2/memory/2132-131-0x00000000055F0000-0x0000000005AEE000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
Bank Slip.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Bank Slip.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Bank Slip.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Slip.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Slip.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Slip.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bank Slip.exedescription pid process target process PID 1588 set thread context of 2132 1588 Bank Slip.exe Bank Slip.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 356 2132 WerFault.exe Bank Slip.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
Bank Slip.exeWerFault.exepid process 2132 Bank Slip.exe 2132 Bank Slip.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe 356 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Bank Slip.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2132 Bank Slip.exe Token: SeRestorePrivilege 356 WerFault.exe Token: SeBackupPrivilege 356 WerFault.exe Token: SeDebugPrivilege 356 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Bank Slip.exedescription pid process target process PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe PID 1588 wrote to memory of 2132 1588 Bank Slip.exe Bank Slip.exe -
outlook_office_path 1 IoCs
Processes:
Bank Slip.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Slip.exe -
outlook_win_path 1 IoCs
Processes:
Bank Slip.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Slip.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bank Slip.exe"C:\Users\Admin\AppData\Local\Temp\Bank Slip.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Bank Slip.exe"C:\Users\Admin\AppData\Local\Temp\Bank Slip.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 13323⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078