Analysis
-
max time kernel
112s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:44
Static task
static1
Behavioral task
behavioral1
Sample
MV LUCKY TIFFANY.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
MV LUCKY TIFFANY.exe
Resource
win10v2004-20220414-en
General
-
Target
MV LUCKY TIFFANY.exe
-
Size
783KB
-
MD5
b878c3a2d2acd700fdc3275ed6557383
-
SHA1
81b161ec5ced453eb0a7ac1d25dafb825ff67228
-
SHA256
a9cf92e1eeda276eae412eb2236216cadcb6342d6c4e638ea337349693f633b9
-
SHA512
11411c7494a1a71a3ad2fdaf9183bdc704801fe2a5a4207b348fbb4feabe74ce57999fbed57e771999997cb44cbb1d3c5238555b8c1eb270deb219cbbc19f271
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.maihyundai.com - Port:
587 - Username:
[email protected] - Password:
isla44332211
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/572-134-0x0000000000400000-0x0000000000466000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
MV LUCKY TIFFANY.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV LUCKY TIFFANY.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV LUCKY TIFFANY.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV LUCKY TIFFANY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MV LUCKY TIFFANY.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DsWhv = "C:\\Users\\Admin\\AppData\\Roaming\\DsWhv\\DsWhv.exe" MV LUCKY TIFFANY.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MV LUCKY TIFFANY.exedescription pid process target process PID 3184 set thread context of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
MV LUCKY TIFFANY.exeMV LUCKY TIFFANY.exepid process 3184 MV LUCKY TIFFANY.exe 3184 MV LUCKY TIFFANY.exe 3184 MV LUCKY TIFFANY.exe 572 MV LUCKY TIFFANY.exe 572 MV LUCKY TIFFANY.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MV LUCKY TIFFANY.exeMV LUCKY TIFFANY.exedescription pid process Token: SeDebugPrivilege 3184 MV LUCKY TIFFANY.exe Token: SeDebugPrivilege 572 MV LUCKY TIFFANY.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
MV LUCKY TIFFANY.exedescription pid process target process PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe PID 3184 wrote to memory of 572 3184 MV LUCKY TIFFANY.exe MV LUCKY TIFFANY.exe -
outlook_office_path 1 IoCs
Processes:
MV LUCKY TIFFANY.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV LUCKY TIFFANY.exe -
outlook_win_path 1 IoCs
Processes:
MV LUCKY TIFFANY.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV LUCKY TIFFANY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MV LUCKY TIFFANY.exe"C:\Users\Admin\AppData\Local\Temp\MV LUCKY TIFFANY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\MV LUCKY TIFFANY.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694B
MD5bded7c44a228f19cb42e3e77c76524f6
SHA16ac0c856ae79a6ca519a4c803545b0d64fa8162f
SHA2561ff32b4f68af1413843d41a20a23ce5fc90ca1581a84896398e270b9177dd4a4
SHA51204053a034cdfb4f2a38e8e0223d3360c3cf7e7e1aefaace82f35d9fa413ac861b42fca88b7381dad468a7b7ee0563176db721a0535ff4026373d509e1c91accd