Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:40
Static task
static1
Behavioral task
behavioral1
Sample
DRAFT BL.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DRAFT BL.exe
Resource
win10v2004-20220414-en
General
-
Target
DRAFT BL.exe
-
Size
571KB
-
MD5
fd0b80bab5473db3cc964b27e8a817e3
-
SHA1
4491d2e9d95c84e93a77d68c1ffd43d08ab342c2
-
SHA256
460a1e3acbde201bf39a076cc672dc052368cf55343fcbc6ad2a10ffb6fb3215
-
SHA512
deb82901f97b59e7f09bb93ec6305f587cba34eea855f9036524ab62be9a8a88110bb06b03002c32ab9ef5b133e05bca851523b130026aea594998fad679d71d
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
KYibdbJ9
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2288-138-0x0000000000400000-0x0000000000468000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DRAFT BL.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation DRAFT BL.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NewApp = "C:\\Users\\Admin\\AppData\\Roaming\\NewApp\\NewApp.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DRAFT BL.exedescription pid process target process PID 1760 set thread context of 2288 1760 DRAFT BL.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
DRAFT BL.exeRegSvcs.exepid process 1760 DRAFT BL.exe 1760 DRAFT BL.exe 1760 DRAFT BL.exe 1760 DRAFT BL.exe 2288 RegSvcs.exe 2288 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DRAFT BL.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1760 DRAFT BL.exe Token: SeDebugPrivilege 2288 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2288 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
DRAFT BL.exedescription pid process target process PID 1760 wrote to memory of 368 1760 DRAFT BL.exe schtasks.exe PID 1760 wrote to memory of 368 1760 DRAFT BL.exe schtasks.exe PID 1760 wrote to memory of 368 1760 DRAFT BL.exe schtasks.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe PID 1760 wrote to memory of 2288 1760 DRAFT BL.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DRAFT BL.exe"C:\Users\Admin\AppData\Local\Temp\DRAFT BL.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tYnZuWKIf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9182.tmp"2⤵
- Creates scheduled task(s)
PID:368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b7f1bbb8b7b022d983fd68227191b16a
SHA113c9e95b5046a269826b874d006820bbc532a6db
SHA256dff31e316726d41cf0f7c99f6e1a2d9591f72dba8cd338969c41b039f79685b7
SHA512bcb68ffdcfabdb566fbd16bc5beda9e9100973d2696a20cdb74f56a9f4f51ad1e99ad4d46a0d9cb8cebd2b0fbb1d554939c6bafebcefabae203a60b155ba2158