Analysis
-
max time kernel
56s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:38
Static task
static1
Behavioral task
behavioral1
Sample
payment099.img.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
payment099.img.exe
Resource
win10v2004-20220414-en
General
-
Target
payment099.img.exe
-
Size
451KB
-
MD5
7a5fd5ee60f3cb1821ed28b7ef23817b
-
SHA1
84a414b566a91ce779f507630a1555a13eeaa3a9
-
SHA256
dacfabf248226bbd129541f002eb53cfc0855334d87e1e148141c32a7b231a52
-
SHA512
8398c3375bfba30cc6fbd4417fe071e3f84b111477a9638315939f3a59014682eb5d1034fef7e96ce58ce50d0d8f02a434a4aa9c65fbc552875756ff537a1316
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-57-0x0000000004510000-0x000000000455E000-memory.dmp family_agenttesla -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1636-56-0x00000000044C0000-0x0000000004516000-memory.dmp rezer0 -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
payment099.img.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment099.img.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment099.img.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment099.img.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
payment099.img.exepid process 1636 payment099.img.exe 1636 payment099.img.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
payment099.img.exedescription pid process Token: SeDebugPrivilege 1636 payment099.img.exe -
outlook_office_path 1 IoCs
Processes:
payment099.img.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment099.img.exe -
outlook_win_path 1 IoCs
Processes:
payment099.img.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment099.img.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-54-0x0000000000BE0000-0x0000000000C58000-memory.dmpFilesize
480KB
-
memory/1636-55-0x0000000000310000-0x0000000000322000-memory.dmpFilesize
72KB
-
memory/1636-56-0x00000000044C0000-0x0000000004516000-memory.dmpFilesize
344KB
-
memory/1636-57-0x0000000004510000-0x000000000455E000-memory.dmpFilesize
312KB