Analysis
-
max time kernel
142s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
HC.CLOVER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HC.CLOVER.exe
Resource
win10v2004-20220414-en
General
-
Target
HC.CLOVER.exe
-
Size
668KB
-
MD5
6b65a861903570a025237153f6129aec
-
SHA1
5bcb467b92684cb93f7fa646a7f28c723078401b
-
SHA256
30ab1b464bd5881b5f8785ec2fa28fe1fd9a7d7430adf54445ef9bc1febafd46
-
SHA512
8b7860c36ba3aed9fb41342962a3cf949a2f9ae8de060ad2f7176aefde2f3b86a5dd2721962992148247cddc9545959334eef1493f28542f56cf7911084627e4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ritac-eg.com - Port:
587 - Username:
[email protected] - Password:
YM%dNtj2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/944-64-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/944-65-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/944-66-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/944-67-0x000000000046179E-mapping.dmp family_agenttesla behavioral1/memory/944-69-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/944-71-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts HC.CLOVER.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
HC.CLOVER.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\WCPCe = "C:\\Users\\Admin\\AppData\\Roaming\\WCPCe\\WCPCe.exe" HC.CLOVER.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HC.CLOVER.exedescription pid process target process PID 292 set thread context of 944 292 HC.CLOVER.exe HC.CLOVER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
HC.CLOVER.exeHC.CLOVER.exepid process 292 HC.CLOVER.exe 292 HC.CLOVER.exe 944 HC.CLOVER.exe 944 HC.CLOVER.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
HC.CLOVER.exeHC.CLOVER.exedescription pid process Token: SeDebugPrivilege 292 HC.CLOVER.exe Token: SeDebugPrivilege 944 HC.CLOVER.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
HC.CLOVER.exeHC.CLOVER.exedescription pid process target process PID 292 wrote to memory of 1320 292 HC.CLOVER.exe schtasks.exe PID 292 wrote to memory of 1320 292 HC.CLOVER.exe schtasks.exe PID 292 wrote to memory of 1320 292 HC.CLOVER.exe schtasks.exe PID 292 wrote to memory of 1320 292 HC.CLOVER.exe schtasks.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 292 wrote to memory of 944 292 HC.CLOVER.exe HC.CLOVER.exe PID 944 wrote to memory of 1768 944 HC.CLOVER.exe REG.exe PID 944 wrote to memory of 1768 944 HC.CLOVER.exe REG.exe PID 944 wrote to memory of 1768 944 HC.CLOVER.exe REG.exe PID 944 wrote to memory of 1768 944 HC.CLOVER.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe -
outlook_win_path 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HC.CLOVER.exe"C:\Users\Admin\AppData\Local\Temp\HC.CLOVER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Gzqjmjnyi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAD22.tmp"2⤵
- Creates scheduled task(s)
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\HC.CLOVER.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:944 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD526c854b76e934dd182de0058df33466d
SHA10e00c5b88478d00f828ec97bd5a89d6d7231d480
SHA256221cf595c719af9f75122ea408f27cc7d619ce3206cfb1ddc5338ad10f2e664b
SHA512d18fdd399fe2818ef75397a38e4b9ccb26b5e12051ebe5f6ec5be27d22df0516b4417f0ff906662bd7ed2e44fc21b0c982a4deaa1116a8683ff3f49f4c63a772