Analysis
-
max time kernel
86s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
General Specification.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
General Specification.exe
Resource
win10v2004-20220414-en
General
-
Target
General Specification.exe
-
Size
894KB
-
MD5
e6201148b3a7026bf29818035359ec26
-
SHA1
8f8e692a0b92952fe80b707e0f8384c82d74db27
-
SHA256
07ceaea9dd455538281cd8afd3b0fe49b34be3bfd7e30718572f6464bead5569
-
SHA512
2fc15e7b62dc9222ae6b52a4a4f15a4dbc388db9b3b07eaa24b2005cb63daf517088c7842c2fd8229b6d26fd3ff30d0c4bfadd87a8c82ccb697ee16c82ff7ba5
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
henry1234
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1844-65-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/1844-67-0x000000000044A4EE-mapping.dmp family_agenttesla behavioral1/memory/1844-64-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/1844-66-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/1844-69-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/1844-71-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
General Specification.exedescription pid process target process PID 1684 set thread context of 1844 1684 General Specification.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
General Specification.exeRegSvcs.exepid process 1684 General Specification.exe 1844 RegSvcs.exe 1844 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
General Specification.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1684 General Specification.exe Token: SeDebugPrivilege 1844 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
General Specification.exedescription pid process target process PID 1684 wrote to memory of 1352 1684 General Specification.exe schtasks.exe PID 1684 wrote to memory of 1352 1684 General Specification.exe schtasks.exe PID 1684 wrote to memory of 1352 1684 General Specification.exe schtasks.exe PID 1684 wrote to memory of 1352 1684 General Specification.exe schtasks.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe PID 1684 wrote to memory of 1844 1684 General Specification.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\General Specification.exe"C:\Users\Admin\AppData\Local\Temp\General Specification.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xvizDVmIDg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEE94.tmp"2⤵
- Creates scheduled task(s)
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54c7e16252c1392b249c9033407ea0bdf
SHA1e3e700eb6bc69f5dd5c51ad41836af7779d5ac99
SHA256b4f8fddfd538662e3519c1bf0a5daf90d5fb5fabb5850ef41513098d0453011b
SHA512b0281e551f152cda61a7ccb1f764a0f9d103f75d720c82f2f0e76393c5dbe8478b706a633716350ffffadbefad2e80ab99faef8a5e3ee28c031ff34478d5f023