Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:59
Static task
static1
Behavioral task
behavioral1
Sample
Mediform SA Order 0508202.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Mediform SA Order 0508202.exe
Resource
win10v2004-20220414-en
General
-
Target
Mediform SA Order 0508202.exe
-
Size
650KB
-
MD5
cacf4def20c8374bb74aad23be229333
-
SHA1
6a6e74dca12a1863f110ef1e7e97fcadce79c5d5
-
SHA256
c1a8d05e6b798ccd18334ab7461cc276bdc3603f35d3186b90bfcb9597ada240
-
SHA512
1a16de241584bf6b5c71c0e0e9919e40a6eda18826bd5dbaf82c2a6eff9a7f14aecbe4351f6f9386a72611cd85d83e026b1da957cd5b93165a063439e0be3c58
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
drsaint1992101
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
drsaint1992101
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3704-132-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Mediform SA Order 0508202.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Mediform SA Order 0508202.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Mediform SA Order 0508202.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Mediform SA Order 0508202.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Mediform SA Order 0508202.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\\\.exe" Mediform SA Order 0508202.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Mediform SA Order 0508202.exedescription pid process target process PID 480 set thread context of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Mediform SA Order 0508202.exeMediform SA Order 0508202.exepid process 480 Mediform SA Order 0508202.exe 480 Mediform SA Order 0508202.exe 480 Mediform SA Order 0508202.exe 480 Mediform SA Order 0508202.exe 3704 Mediform SA Order 0508202.exe 3704 Mediform SA Order 0508202.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Mediform SA Order 0508202.exepid process 3704 Mediform SA Order 0508202.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Mediform SA Order 0508202.exeMediform SA Order 0508202.exedescription pid process Token: SeDebugPrivilege 480 Mediform SA Order 0508202.exe Token: SeDebugPrivilege 3704 Mediform SA Order 0508202.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Mediform SA Order 0508202.exepid process 3704 Mediform SA Order 0508202.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Mediform SA Order 0508202.exedescription pid process target process PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe PID 480 wrote to memory of 3704 480 Mediform SA Order 0508202.exe Mediform SA Order 0508202.exe -
outlook_office_path 1 IoCs
Processes:
Mediform SA Order 0508202.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Mediform SA Order 0508202.exe -
outlook_win_path 1 IoCs
Processes:
Mediform SA Order 0508202.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Mediform SA Order 0508202.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mediform SA Order 0508202.exe"C:\Users\Admin\AppData\Local\Temp\Mediform SA Order 0508202.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\Mediform SA Order 0508202.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3704