Analysis
-
max time kernel
118s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe
Resource
win10v2004-20220414-en
General
-
Target
48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe
-
Size
719KB
-
MD5
1a3a0c8bdf1d6db781adc5d730668495
-
SHA1
5a41a47ffbac1f5fb03520dd79dea0a1de22b00d
-
SHA256
48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0
-
SHA512
47f19026d24d1a7da6ab551f565bf3d2109109b23723228edfcb8a782407f0cdc1444abcc4651fdd62b1d51293469deca68f075a7eaa59ac5dde945abb9d7693
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nusatek.com - Port:
587 - Username:
[email protected] - Password:
nusatek187753d - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
resource yara_rule behavioral1/memory/240-62-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/240-63-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/240-64-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/240-65-0x000000000043768E-mapping.dmp family_agenttesla behavioral1/memory/240-67-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/240-69-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 240 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 240 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe Token: SeDebugPrivilege 240 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1580 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 27 PID 2000 wrote to memory of 1580 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 27 PID 2000 wrote to memory of 1580 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 27 PID 2000 wrote to memory of 1580 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 27 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29 PID 2000 wrote to memory of 240 2000 48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe"C:\Users\Admin\AppData\Local\Temp\48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jNBsvPueSVkAdn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp51E8.tmp"2⤵
- Creates scheduled task(s)
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\48acb8f8ec73ee09270a98abbce5091670405ac28ec5016d5cfcfe8439b15eb0.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56993b4f7d4bf9e0876bf0f011d983279
SHA1847986037eb345f87199f6c1cee973e23a1b107d
SHA2560cc13038a1845e71cfeb26c46a63c53497ee6980c21112fdafb05b10f0739773
SHA5125a7157cae9020f41944aaa2872927a209847d83c033c8be071a9aeb3bedd885e4e928c5d3a216b6e06b49e95537964f1ff069f1cbf8b31c5aa40b512a2886320