Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:54
Static task
static1
Behavioral task
behavioral1
Sample
yevIa4Z99KSppE9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
yevIa4Z99KSppE9.exe
Resource
win10v2004-20220414-en
General
-
Target
yevIa4Z99KSppE9.exe
-
Size
423KB
-
MD5
aa7bc1c91e5d0436578c580662fc3253
-
SHA1
76d62a638598aaf315030c3f8c21afff1b0a6cb1
-
SHA256
a9a90e322d043cf6430fb070d2cf81ea38b36b174add5b06c3d8691c6c605949
-
SHA512
f854405a1a22d1e7d6ada376efc5550706d29239855c97b98d6696e04f85fb14d6fd732b9339e7c5c52ffe0b282111ee2669b7606ec75cf4b843fae9ca1b85d0
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Mold4lord231
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Mold4lord231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/216-135-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
yevIa4Z99KSppE9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation yevIa4Z99KSppE9.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
yevIa4Z99KSppE9.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yevIa4Z99KSppE9.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yevIa4Z99KSppE9.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yevIa4Z99KSppE9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
yevIa4Z99KSppE9.exedescription pid process target process PID 4116 set thread context of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
yevIa4Z99KSppE9.exeyevIa4Z99KSppE9.exepid process 4116 yevIa4Z99KSppE9.exe 4116 yevIa4Z99KSppE9.exe 4116 yevIa4Z99KSppE9.exe 216 yevIa4Z99KSppE9.exe 216 yevIa4Z99KSppE9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
yevIa4Z99KSppE9.exeyevIa4Z99KSppE9.exedescription pid process Token: SeDebugPrivilege 4116 yevIa4Z99KSppE9.exe Token: SeDebugPrivilege 216 yevIa4Z99KSppE9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
yevIa4Z99KSppE9.exepid process 216 yevIa4Z99KSppE9.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
yevIa4Z99KSppE9.exedescription pid process target process PID 4116 wrote to memory of 548 4116 yevIa4Z99KSppE9.exe schtasks.exe PID 4116 wrote to memory of 548 4116 yevIa4Z99KSppE9.exe schtasks.exe PID 4116 wrote to memory of 548 4116 yevIa4Z99KSppE9.exe schtasks.exe PID 4116 wrote to memory of 4468 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 4468 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 4468 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe PID 4116 wrote to memory of 216 4116 yevIa4Z99KSppE9.exe yevIa4Z99KSppE9.exe -
outlook_office_path 1 IoCs
Processes:
yevIa4Z99KSppE9.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yevIa4Z99KSppE9.exe -
outlook_win_path 1 IoCs
Processes:
yevIa4Z99KSppE9.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yevIa4Z99KSppE9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yevIa4Z99KSppE9.exe"C:\Users\Admin\AppData\Local\Temp\yevIa4Z99KSppE9.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kNUwplUJIJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1722.tmp"2⤵
- Creates scheduled task(s)
PID:548 -
C:\Users\Admin\AppData\Local\Temp\yevIa4Z99KSppE9.exe"{path}"2⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\yevIa4Z99KSppE9.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54fbab9900b0c9e2e5deb830d3a29bbb1
SHA19de3c1574525500293950b781c44acdf6094e454
SHA256be3d40fcdbe26b2ad7e42454a65c19074f7876b0ec7c3a934c4efca78c61ec04
SHA5121e2188f44c0efb7e5e8271aac0955b963390c9eeb10b1d72990ec076fd95068b74d624c550334c99128ade49d17e126b67be503ccc539e30b23772d6571da3d4