Analysis
-
max time kernel
103s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:31
Static task
static1
Behavioral task
behavioral1
Sample
E410B98888.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
E410B98888.exe
Resource
win10v2004-20220414-en
General
-
Target
E410B98888.exe
-
Size
1.7MB
-
MD5
4fb67120185f1f35a4ee966dd8673eb7
-
SHA1
563837b69516b71eaf64d5bcedf014adbbc45f07
-
SHA256
184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
-
SHA512
974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 10 IoCs
resource yara_rule behavioral1/memory/1936-54-0x0000000000DB0000-0x0000000000F64000-memory.dmp family_masslogger behavioral1/files/0x000800000001235b-66.dat family_masslogger behavioral1/files/0x000800000001235b-68.dat family_masslogger behavioral1/files/0x000800000001235b-69.dat family_masslogger behavioral1/memory/580-70-0x00000000001D0000-0x0000000000384000-memory.dmp family_masslogger behavioral1/files/0x000800000001235b-76.dat family_masslogger behavioral1/files/0x000800000001235b-75.dat family_masslogger behavioral1/files/0x000800000001235b-74.dat family_masslogger behavioral1/files/0x000800000001235b-73.dat family_masslogger behavioral1/files/0x000800000001235b-77.dat family_masslogger -
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/files/0x000b000000012316-57.dat family_agenttesla behavioral1/files/0x000b000000012316-58.dat family_agenttesla behavioral1/files/0x000b000000012316-60.dat family_agenttesla behavioral1/files/0x000b000000012316-61.dat family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 2036 wiseman.exe 580 .exe -
Loads dropped DLL 8 IoCs
pid Process 1936 E410B98888.exe 1936 E410B98888.exe 1936 E410B98888.exe 1132 WerFault.exe 1132 WerFault.exe 1132 WerFault.exe 1132 WerFault.exe 1132 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1132 580 WerFault.exe 34 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1936 E410B98888.exe 1936 E410B98888.exe 2036 wiseman.exe 2036 wiseman.exe 580 .exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1936 E410B98888.exe Token: SeDebugPrivilege 2036 wiseman.exe Token: SeDebugPrivilege 580 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 wiseman.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2036 1936 E410B98888.exe 27 PID 1936 wrote to memory of 2036 1936 E410B98888.exe 27 PID 1936 wrote to memory of 2036 1936 E410B98888.exe 27 PID 1936 wrote to memory of 2036 1936 E410B98888.exe 27 PID 1936 wrote to memory of 952 1936 E410B98888.exe 28 PID 1936 wrote to memory of 952 1936 E410B98888.exe 28 PID 1936 wrote to memory of 952 1936 E410B98888.exe 28 PID 1936 wrote to memory of 952 1936 E410B98888.exe 28 PID 952 wrote to memory of 904 952 cmd.exe 30 PID 952 wrote to memory of 904 952 cmd.exe 30 PID 952 wrote to memory of 904 952 cmd.exe 30 PID 952 wrote to memory of 904 952 cmd.exe 30 PID 1936 wrote to memory of 580 1936 E410B98888.exe 34 PID 1936 wrote to memory of 580 1936 E410B98888.exe 34 PID 1936 wrote to memory of 580 1936 E410B98888.exe 34 PID 1936 wrote to memory of 580 1936 E410B98888.exe 34 PID 580 wrote to memory of 1132 580 .exe 35 PID 580 wrote to memory of 1132 580 .exe 35 PID 580 wrote to memory of 1132 580 .exe 35 PID 580 wrote to memory of 1132 580 .exe 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E410B98888.exe"C:\Users\Admin\AppData\Local\Temp\E410B98888.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\Desktop\wiseman.exe"C:\Users\Admin\Desktop\wiseman.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2036
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:904
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 7283⤵
- Loads dropped DLL
- Program crash
PID:1132
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c