Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
Transfer Confirmation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Transfer Confirmation.exe
Resource
win10v2004-20220414-en
General
-
Target
Transfer Confirmation.exe
-
Size
617KB
-
MD5
4933039c07233e307f6a8ee44229f81b
-
SHA1
e0f164c88ead46da499516596adb16bde31b3243
-
SHA256
1c8ee9c80b54c9a2f245d2e98ce8d25702becbc6584135c4278169d406016dd8
-
SHA512
6072234ed2ee6c19e45ccc61dc52e730cbfd568a78ad2e11eae4714c34e95894b8fe93eabcb8c2ad1cc1e3b45a5e0326d393418dce0df7c39b4baa0289a94d7c
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
K$pbkEK0
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
K$pbkEK0
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4776-139-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Transfer Confirmation.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Transfer Confirmation.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Transfer Confirmation.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Transfer Confirmation.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Transfer Confirmation.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Transfer Confirmation.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Transfer Confirmation.exedescription pid process target process PID 3540 set thread context of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Transfer Confirmation.exeTransfer Confirmation.exepid process 3540 Transfer Confirmation.exe 3540 Transfer Confirmation.exe 3540 Transfer Confirmation.exe 4776 Transfer Confirmation.exe 4776 Transfer Confirmation.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Transfer Confirmation.exeTransfer Confirmation.exedescription pid process Token: SeDebugPrivilege 3540 Transfer Confirmation.exe Token: SeDebugPrivilege 4776 Transfer Confirmation.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Transfer Confirmation.exepid process 4776 Transfer Confirmation.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Transfer Confirmation.exedescription pid process target process PID 3540 wrote to memory of 1856 3540 Transfer Confirmation.exe schtasks.exe PID 3540 wrote to memory of 1856 3540 Transfer Confirmation.exe schtasks.exe PID 3540 wrote to memory of 1856 3540 Transfer Confirmation.exe schtasks.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe PID 3540 wrote to memory of 4776 3540 Transfer Confirmation.exe Transfer Confirmation.exe -
outlook_office_path 1 IoCs
Processes:
Transfer Confirmation.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Transfer Confirmation.exe -
outlook_win_path 1 IoCs
Processes:
Transfer Confirmation.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Transfer Confirmation.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Transfer Confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Transfer Confirmation.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ekPvgdvGqRbZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp805B.tmp"2⤵
- Creates scheduled task(s)
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Transfer Confirmation.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52dc88967f8ab98d834998c930371997a
SHA1fe54fd90824e71d0df04a47f460e1f72b9e1ffc4
SHA256454ef7333f3fcdfff8957611a2bc97b3ab5aca972406b6d323e407424f2e7da9
SHA512975af2932004d1f90474b2e0be35143e1c824c51d92b504cffb52036a4f37f1b62256c5c536089b570f23ada2cf37bbd3af96b14ebfdcfaacf7a65ba406cda77
-
Filesize
1KB
MD5e4fb8b2dc6855654be9827e6f3ee461f
SHA11958ed144546229f193ed892f7c99a1c30851d7a
SHA256656bbad5a81920df44bea57505dbddf585b17db6558ede8a50d309f99d7ad4a7
SHA5126b64f6180cb76f53933ec39aa8a1ccae774459a5338f4cff8a7f8eb695ee9b59521b94dffcad065902305301fa46c625f8511eda01d984a2e28d2b7054bf80a8