Analysis

  • max time kernel
    141s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    14-04-2022 06:51

General

  • Target

    da64442d3c6a951d48bfd35b0cfd91c5146158c2241953def76c60f1233938e3.exe

  • Size

    506KB

  • MD5

    6a0e5a38fbf3c04fa128881663310ea7

  • SHA1

    936acfcffb2970c75d735d918ffe52dbf07580b0

  • SHA256

    da64442d3c6a951d48bfd35b0cfd91c5146158c2241953def76c60f1233938e3

  • SHA512

    8235c9b54dbea3008c305e1915e2684c7f8820ffd40b5c2cdb8d808825d3c3a44f11f08e448d3317b14594d3d3433a6970381450dff13a2d68ea1bf459f15ccd

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    2GOODface

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da64442d3c6a951d48bfd35b0cfd91c5146158c2241953def76c60f1233938e3.exe
    "C:\Users\Admin\AppData\Local\Temp\da64442d3c6a951d48bfd35b0cfd91c5146158c2241953def76c60f1233938e3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YsZjlXg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB4CF.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2044
    • C:\Users\Admin\AppData\Local\Temp\da64442d3c6a951d48bfd35b0cfd91c5146158c2241953def76c60f1233938e3.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpB4CF.tmp

    Filesize

    1KB

    MD5

    0334411d6909b2b43167d1af7a4819bf

    SHA1

    0bb975bbc38391b431f0212ddb9f426753d61aae

    SHA256

    969b030131c23c25df7231ffb7e055697f5c18230764c018931151e978869306

    SHA512

    d10321c5359e8754db897ab8ca5bb6df6a88709d96645681672b146a93c32f3f3f4cd5fa1c4148238b23329d35ce0f75caed8113e115a40195102704e84722a0

  • memory/1096-55-0x0000000000530000-0x000000000054C000-memory.dmp

    Filesize

    112KB

  • memory/1096-56-0x0000000007280000-0x00000000072E6000-memory.dmp

    Filesize

    408KB

  • memory/1096-54-0x0000000000E50000-0x0000000000ED6000-memory.dmp

    Filesize

    536KB

  • memory/1772-64-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1772-59-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1772-60-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1772-62-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1772-63-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1772-67-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1772-69-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB