Analysis
-
max time kernel
90s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:31
Static task
static1
Behavioral task
behavioral1
Sample
E410B98888.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
E410B98888.exe
Resource
win10v2004-20220414-en
General
-
Target
E410B98888.exe
-
Size
1.7MB
-
MD5
4fb67120185f1f35a4ee966dd8673eb7
-
SHA1
563837b69516b71eaf64d5bcedf014adbbc45f07
-
SHA256
184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
-
SHA512
974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
Malware Config
Extracted
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Extracted
agenttesla
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 3 IoCs
resource yara_rule behavioral2/memory/4288-130-0x00000000007F0000-0x00000000009A4000-memory.dmp family_masslogger behavioral2/files/0x0006000000022f05-141.dat family_masslogger behavioral2/files/0x0006000000022f05-142.dat family_masslogger -
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000022f03-135.dat family_agenttesla behavioral2/files/0x0006000000022f03-136.dat family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 852 wiseman.exe 4060 .exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation E410B98888.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3432 4060 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4288 E410B98888.exe 852 wiseman.exe 852 wiseman.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4288 E410B98888.exe 4060 .exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4288 E410B98888.exe Token: SeDebugPrivilege 852 wiseman.exe Token: SeDebugPrivilege 4060 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 852 wiseman.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4288 wrote to memory of 852 4288 E410B98888.exe 86 PID 4288 wrote to memory of 852 4288 E410B98888.exe 86 PID 4288 wrote to memory of 852 4288 E410B98888.exe 86 PID 4288 wrote to memory of 4856 4288 E410B98888.exe 87 PID 4288 wrote to memory of 4856 4288 E410B98888.exe 87 PID 4288 wrote to memory of 4856 4288 E410B98888.exe 87 PID 4856 wrote to memory of 4028 4856 cmd.exe 89 PID 4856 wrote to memory of 4028 4856 cmd.exe 89 PID 4856 wrote to memory of 4028 4856 cmd.exe 89 PID 4288 wrote to memory of 4060 4288 E410B98888.exe 92 PID 4288 wrote to memory of 4060 4288 E410B98888.exe 92 PID 4288 wrote to memory of 4060 4288 E410B98888.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E410B98888.exe"C:\Users\Admin\AppData\Local\Temp\E410B98888.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\Desktop\wiseman.exe"C:\Users\Admin\Desktop\wiseman.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:4028
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 12723⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4060 -ip 40601⤵PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
1.7MB
MD54fb67120185f1f35a4ee966dd8673eb7
SHA1563837b69516b71eaf64d5bcedf014adbbc45f07
SHA256184f804223ad564aad94a727a9d58543e2d01a308902c95eb328016739938a90
SHA512974c0a2e1f41ea34b29fed609ab9765d6d2c5e352263c367078373be1bd9d8a6032cf75e8b0ebf88de6af90df8cc9154a8a1182a43d4804b0bfaeb83adfa3c75
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c