Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
03-12-2021 16:36
Static task
static1
Behavioral task
behavioral1
Sample
Partial Shipment/newp.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
Partial Shipment/newp.exe
Resource
win10-en-20211104
General
-
Target
Partial Shipment/newp.exe
-
Size
571KB
-
MD5
4ee15954d954941e65043fd7abd506db
-
SHA1
42e2a770d730d6874f40b4f83e885a3c6e737b4b
-
SHA256
9b78043d9ee5d318e4d5f3fbb0fc07ff1fe364a77673a54e6a39a14c3a8edcd2
-
SHA512
d37297453b35f295b7d4043199341c7b09e6a3d2f5ee33412ef7dd5c2e6295af1d1eeaee9ef316064dc3da24d15685dad03b70f67afde4e1ca101299c144125c
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.scahe.co.in - Port:
587 - Username:
[email protected] - Password:
scaheavy@12345
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/364-57-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/364-58-0x000000000040188B-mapping.dmp family_agenttesla behavioral1/memory/364-60-0x00000000003B0000-0x00000000003E7000-memory.dmp family_agenttesla behavioral1/memory/364-62-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
newp.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts newp.exe -
Loads dropped DLL 1 IoCs
Processes:
newp.exepid process 824 newp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
newp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 newp.exe Key opened \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 newp.exe Key opened \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 newp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
newp.exedescription pid process target process PID 824 set thread context of 364 824 newp.exe newp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
newp.exepid process 364 newp.exe 364 newp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
newp.exedescription pid process Token: SeDebugPrivilege 364 newp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
newp.exedescription pid process target process PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe PID 824 wrote to memory of 364 824 newp.exe newp.exe -
outlook_office_path 1 IoCs
Processes:
newp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 newp.exe -
outlook_win_path 1 IoCs
Processes:
newp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 newp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Partial Shipment\newp.exe"C:\Users\Admin\AppData\Local\Temp\Partial Shipment\newp.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Partial Shipment\newp.exe"C:\Users\Admin\AppData\Local\Temp\Partial Shipment\newp.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
97857305466b02ab59a819135d7dfa56
SHA115f6e7c75441fe69233ae0e66ad14b0ba7d9b612
SHA256edfead1d00980f940a81c530636c15b144888db164cc7160ee7b5d45f69ef48a
SHA512cb4cf82ac333c6fb712914638f13f36b6a41270802357df30bd6806e87591a6d0a39d95ef2eb64ff458ab819a6ab809e896f3232fd5b0a44a289f2a6fcb17b81