Analysis
-
max time kernel
142s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:37
Static task
static1
Behavioral task
behavioral1
Sample
HBL.XML.document5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HBL.XML.document5.exe
Resource
win10v2004-20220414-en
General
-
Target
HBL.XML.document5.exe
-
Size
609KB
-
MD5
0f8fa81d21ef22bb74d557f2bc775b88
-
SHA1
970259ff5d86466bbd86cbcc2515d66d07541983
-
SHA256
936f5e5e867ca1c182bfe0dde236ee7605131e3082371a3ce34d2c82c4428881
-
SHA512
f1f6aacdc50217d529e932673d0368a45a79d90f10ea5201604e375d9a55b66e0db148c0516e82259b85d26f9eb75070e87f0cd02e6cbda7554f2e71532076f4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
qwerty123@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/796-61-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/796-62-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/796-63-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/796-64-0x0000000000446DBE-mapping.dmp family_agenttesla behavioral1/memory/796-66-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/796-68-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
HBL.XML.document5.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HBL.XML.document5.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HBL.XML.document5.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HBL.XML.document5.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HBL.XML.document5.exedescription pid process target process PID 1012 set thread context of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
HBL.XML.document5.exeHBL.XML.document5.exepid process 1012 HBL.XML.document5.exe 1012 HBL.XML.document5.exe 796 HBL.XML.document5.exe 796 HBL.XML.document5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
HBL.XML.document5.exeHBL.XML.document5.exedescription pid process Token: SeDebugPrivilege 1012 HBL.XML.document5.exe Token: SeDebugPrivilege 796 HBL.XML.document5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
HBL.XML.document5.exedescription pid process target process PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe PID 1012 wrote to memory of 796 1012 HBL.XML.document5.exe HBL.XML.document5.exe -
outlook_office_path 1 IoCs
Processes:
HBL.XML.document5.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HBL.XML.document5.exe -
outlook_win_path 1 IoCs
Processes:
HBL.XML.document5.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HBL.XML.document5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HBL.XML.document5.exe"C:\Users\Admin\AppData\Local\Temp\HBL.XML.document5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\HBL.XML.document5.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:796