Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:47
Static task
static1
Behavioral task
behavioral1
Sample
Remit.Advice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Remit.Advice.exe
Resource
win10v2004-20220414-en
General
-
Target
Remit.Advice.exe
-
Size
406KB
-
MD5
eee0330f850eeb8d07aeb8e180afc051
-
SHA1
0a64e31ae85096b82c8d36b497eb1fab9bc8fc10
-
SHA256
cdebb39b2a4f203a8c0be1ce06cbeed1396321d8871d3cc46d4c6639ae7d25a2
-
SHA512
66a0fc4a1eefb21a31297a4350084b6a8ce4b25af3bbf224c9b387ed7736c7f5465ca97c40454f6c5506d4f3d390f3271fb709de1a3094170aa057004d597fda
Malware Config
Extracted
Protocol: smtp- Host:
mail.itdone.cz - Port:
587 - Username:
[email protected] - Password:
viObavejMa
Extracted
agenttesla
Protocol: smtp- Host:
mail.itdone.cz - Port:
587 - Username:
[email protected] - Password:
viObavejMa
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4416-137-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Remit.Advice.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Remit.Advice.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Remit.Advice.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remit.Advice.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remit.Advice.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remit.Advice.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Remit.Advice.exedescription pid process target process PID 5052 set thread context of 4416 5052 Remit.Advice.exe Remit.Advice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Remit.Advice.exepid process 4416 Remit.Advice.exe 4416 Remit.Advice.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Remit.Advice.exedescription pid process Token: SeDebugPrivilege 4416 Remit.Advice.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Remit.Advice.exedescription pid process target process PID 5052 wrote to memory of 1044 5052 Remit.Advice.exe schtasks.exe PID 5052 wrote to memory of 1044 5052 Remit.Advice.exe schtasks.exe PID 5052 wrote to memory of 1044 5052 Remit.Advice.exe schtasks.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe PID 5052 wrote to memory of 4416 5052 Remit.Advice.exe Remit.Advice.exe -
outlook_office_path 1 IoCs
Processes:
Remit.Advice.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remit.Advice.exe -
outlook_win_path 1 IoCs
Processes:
Remit.Advice.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remit.Advice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WiAEpdKhZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC5F0.tmp"2⤵
- Creates scheduled task(s)
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"C:\Users\Admin\AppData\Local\Temp\Remit.Advice.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51a1f844a8173146bf8a0c23d2d927543
SHA1f3f66b296673a5e68d4822273636afaec14a41f1
SHA2561d6ac000126e0230770e763be4397d81ed23f5b88594dd9bb04ceeb5747434cd
SHA5120b50908e6dfca00e9d8094b78e12c18e1bd1face5ae1ac81b4593b3c7d92a581bd3b1a86bdfa3b9a13c7e0b3d3dd17f1481628648c64a78ead2ae8859e492af3