Analysis
-
max time kernel
4294211s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-04-2022 12:42
Static task
static1
Behavioral task
behavioral1
Sample
407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe
Resource
win10v2004-20220310-en
General
-
Target
407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe
-
Size
758KB
-
MD5
b9f07eae87ab8f97846925ba316d0ced
-
SHA1
fe930ddf51c68a9750ebd06fcf48ac0a57354d32
-
SHA256
407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a
-
SHA512
74b849e9c6d584d5294d06f3c8467f9f8b4fab4a4e94ae079f5e008880f4cdc83ab2e730023c0cbda9b57d405580e4ceefee169f24f989030ddc952eb0120351
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.totallyanonymous.com - Port:
587 - Username:
[email protected] - Password:
309h528S - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
resource yara_rule behavioral1/memory/1072-60-0x00000000053A0000-0x00000000053DC000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 700 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe 29 PID 1072 wrote to memory of 700 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe 29 PID 1072 wrote to memory of 700 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe 29 PID 1072 wrote to memory of 700 1072 407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe"C:\Users\Admin\AppData\Local\Temp\407d00ff864c23f7e0bba54b241a5a0ca3338536f379b01c9d3c4265ee3d5a7a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OyHrDZnwOS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB07B.tmp"2⤵
- Creates scheduled task(s)
PID:700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5711adfc036165aee96293000ab70d798
SHA1c96d886f79102661880d4ba11fb93ab08a25b0b8
SHA256f248ce6dfa2dfd75f92ae1ac4d529122ab8ab2d84974d02d5aff6fb44e3bd4de
SHA512e0c997fe7ac1d02b1797f92532af803bcef40ababd4a475744082a3d140788f703859e5675e1b5ae3eec3e129ad83eb59012af23f38fa258f5070dcb23b65ec0