Analysis
-
max time kernel
120s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ta9hOZ9yGYrrbrJ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ta9hOZ9yGYrrbrJ.exe
Resource
win10v2004-20220414-en
General
-
Target
ta9hOZ9yGYrrbrJ.exe
-
Size
662KB
-
MD5
f4262471f23208adc42ffbcaaf7cdb99
-
SHA1
7e858fab80da0e74ce6eeb5924841cfb8cfa41cf
-
SHA256
1ebe798364b176f491d9eb6b1b4eedf59e43d712883460f61212deafb2ddcf6c
-
SHA512
1b55467a1f64d21fcb26ef768b2f7c59070d766ef41574b2d0ae4f88d4ddfbb0d821b26ff1fa8ef126c1f24f10b3351f1a7576af619f9211ba4f270577f599cc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.jaldhl.com - Port:
587 - Username:
[email protected] - Password:
LlJGJr!5
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1384-59-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/1384-60-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/1384-61-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/1384-62-0x0000000000460F3E-mapping.dmp family_agenttesla behavioral1/memory/1384-64-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla behavioral1/memory/1384-66-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ta9hOZ9yGYrrbrJ.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ta9hOZ9yGYrrbrJ.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ta9hOZ9yGYrrbrJ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exedescription pid process target process PID 1992 set thread context of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exeta9hOZ9yGYrrbrJ.exepid process 1992 ta9hOZ9yGYrrbrJ.exe 1992 ta9hOZ9yGYrrbrJ.exe 1384 ta9hOZ9yGYrrbrJ.exe 1384 ta9hOZ9yGYrrbrJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exeta9hOZ9yGYrrbrJ.exedescription pid process Token: SeDebugPrivilege 1992 ta9hOZ9yGYrrbrJ.exe Token: SeDebugPrivilege 1384 ta9hOZ9yGYrrbrJ.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exeta9hOZ9yGYrrbrJ.exedescription pid process target process PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1992 wrote to memory of 1384 1992 ta9hOZ9yGYrrbrJ.exe ta9hOZ9yGYrrbrJ.exe PID 1384 wrote to memory of 1036 1384 ta9hOZ9yGYrrbrJ.exe REG.exe PID 1384 wrote to memory of 1036 1384 ta9hOZ9yGYrrbrJ.exe REG.exe PID 1384 wrote to memory of 1036 1384 ta9hOZ9yGYrrbrJ.exe REG.exe PID 1384 wrote to memory of 1036 1384 ta9hOZ9yGYrrbrJ.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ta9hOZ9yGYrrbrJ.exe -
outlook_win_path 1 IoCs
Processes:
ta9hOZ9yGYrrbrJ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ta9hOZ9yGYrrbrJ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ta9hOZ9yGYrrbrJ.exe"C:\Users\Admin\AppData\Local\Temp\ta9hOZ9yGYrrbrJ.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\ta9hOZ9yGYrrbrJ.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1384 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer / v NoRun / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1036