Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
HC.CLOVER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HC.CLOVER.exe
Resource
win10v2004-20220414-en
General
-
Target
HC.CLOVER.exe
-
Size
668KB
-
MD5
6b65a861903570a025237153f6129aec
-
SHA1
5bcb467b92684cb93f7fa646a7f28c723078401b
-
SHA256
30ab1b464bd5881b5f8785ec2fa28fe1fd9a7d7430adf54445ef9bc1febafd46
-
SHA512
8b7860c36ba3aed9fb41342962a3cf949a2f9ae8de060ad2f7176aefde2f3b86a5dd2721962992148247cddc9545959334eef1493f28542f56cf7911084627e4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ritac-eg.com - Port:
587 - Username:
[email protected] - Password:
YM%dNtj2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2552-138-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts HC.CLOVER.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HC.CLOVER.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation HC.CLOVER.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
HC.CLOVER.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WCPCe = "C:\\Users\\Admin\\AppData\\Roaming\\WCPCe\\WCPCe.exe" HC.CLOVER.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HC.CLOVER.exedescription pid process target process PID 2392 set thread context of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
HC.CLOVER.exeHC.CLOVER.exepid process 2392 HC.CLOVER.exe 2392 HC.CLOVER.exe 2392 HC.CLOVER.exe 2552 HC.CLOVER.exe 2552 HC.CLOVER.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
HC.CLOVER.exeHC.CLOVER.exedescription pid process Token: SeDebugPrivilege 2392 HC.CLOVER.exe Token: SeDebugPrivilege 2552 HC.CLOVER.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
HC.CLOVER.exeHC.CLOVER.exedescription pid process target process PID 2392 wrote to memory of 388 2392 HC.CLOVER.exe schtasks.exe PID 2392 wrote to memory of 388 2392 HC.CLOVER.exe schtasks.exe PID 2392 wrote to memory of 388 2392 HC.CLOVER.exe schtasks.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2392 wrote to memory of 2552 2392 HC.CLOVER.exe HC.CLOVER.exe PID 2552 wrote to memory of 1788 2552 HC.CLOVER.exe REG.exe PID 2552 wrote to memory of 1788 2552 HC.CLOVER.exe REG.exe PID 2552 wrote to memory of 1788 2552 HC.CLOVER.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe -
outlook_win_path 1 IoCs
Processes:
HC.CLOVER.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HC.CLOVER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HC.CLOVER.exe"C:\Users\Admin\AppData\Local\Temp\HC.CLOVER.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Gzqjmjnyi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43C0.tmp"2⤵
- Creates scheduled task(s)
PID:388 -
C:\Users\Admin\AppData\Local\Temp\HC.CLOVER.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2552 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56dcfdb496c3cf0a736b09292618b380d
SHA159d3aecbd319c9b48d500b51a093ee48d02af334
SHA256cb5dcf594045c8b7a5f87e8a12eabbd3e53e673654926027627ed79ef3e2a203
SHA5129b7d22dc9e40d11693f7191f7b075a78974322af145010e66b19d989e678477dfe4741e88d02929d5b37236276f4605bc23a7adbedf43b66cd3c4e5e7b7e67ff
-
Filesize
1KB
MD5611f229262155e719a056ebb11550186
SHA1d44e5975a436115691d5c313b6609860ce6be289
SHA256a2cf73e7821bb5a419844ecdc23c99e22409e9a6d70fcb7d093d99d916393de3
SHA51225be41ec1679362f6791eee34ccfa89bb50ff8134739cbea84fd8aa8de6fe5bb787c8808c9207ac8ba538ee545b641ce0e26fde20aded8c9f2862f97e419978e