Analysis
-
max time kernel
114s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
14-04-2022 12:39
Static task
static1
Behavioral task
behavioral1
Sample
e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe
Resource
win10v2004-20220310-en
General
-
Target
e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe
-
Size
756KB
-
MD5
f102830b868ee3c2a5c50831d0848052
-
SHA1
6040522ab7642bea1555995c7b43906dcee46173
-
SHA256
e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0
-
SHA512
b77c2fd5bc2ec52064be214954e5010accfa785463cabca7ae2b07893f2541ca66b66a95cab9d32f90158dcf8244096051d6674e0f1020a2c9cab72523588df2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
mmm777
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
resource yara_rule behavioral1/memory/1668-63-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1668-65-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1668-64-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1668-66-0x000000000043785E-mapping.dmp family_agenttesla behavioral1/memory/1668-68-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1668-70-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 684 set thread context of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1668 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 1668 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 684 wrote to memory of 1408 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 28 PID 684 wrote to memory of 1408 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 28 PID 684 wrote to memory of 1408 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 28 PID 684 wrote to memory of 1408 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 28 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30 PID 684 wrote to memory of 1668 684 e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe"C:\Users\Admin\AppData\Local\Temp\e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Jrqpij" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDA78.tmp"2⤵
- Creates scheduled task(s)
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\e484d01f9c3885794ba1fbd44760b61fe779cb0a5deccaa0b191e04f6f9810c0.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5013282ef236015c3d48d4e3d5a218a7d
SHA13154903a3b2a8d3f7a565c7f5721a50ecb5b99ca
SHA2564582254dac32d24c9428d0aa204dbe36667d8dccf9bc05a30c4a989ff4f44e29
SHA512237d6f2488cb5ebb13d703068a512221cb12da102e15a8230568c85fbdde1d6520186671054613d72d8a33b1bffaaeb2ba21dfefab8d93368b8e01facc8a1c6b