Analysis
-
max time kernel
142s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:38
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v2004-20220414-en
General
-
Target
PO.exe
-
Size
1.3MB
-
MD5
911cfe476937e7f4aad553bc0814e802
-
SHA1
0e8b839716a75991db3f26c5c768059f1aaff27e
-
SHA256
b65f542c74ced21ba853b4840f0cfad311027e518b1c3925bd530a2da424293c
-
SHA512
024749dbe0672625ced0f2e9b2039ba20d4b6f9ef4d5342678773b309e340f93769f081962fece7b2eed4774b0e1869801e0e773a353949c073a89b1d28da1ad
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.israelagroconsultant.com - Port:
587 - Username:
[email protected] - Password:
israelagro@123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2660-138-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation PO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TkvuX = "C:\\Users\\Admin\\AppData\\Roaming\\TkvuX\\TkvuX.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO.exedescription pid process target process PID 3768 set thread context of 2660 3768 PO.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
PO.exeRegSvcs.exepid process 3768 PO.exe 2660 RegSvcs.exe 2660 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 3768 PO.exe Token: SeDebugPrivilege 2660 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
PO.exedescription pid process target process PID 3768 wrote to memory of 800 3768 PO.exe schtasks.exe PID 3768 wrote to memory of 800 3768 PO.exe schtasks.exe PID 3768 wrote to memory of 800 3768 PO.exe schtasks.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe PID 3768 wrote to memory of 2660 3768 PO.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zQklBRQkb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp94ED.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp94ED.tmpFilesize
1KB
MD540ec3a4752eae2c5d998ff27898d8047
SHA1433f93b6b8bb649f1a9516dfbc8348e6d75fce69
SHA256b811c6360e7ca6fec5c060a9d21c8d5dcff0e7da304be18421395242c817a27c
SHA5124bea0377e22e7387dadd82f06966ee4cbf092aa70f84e7b87f404d5f45d10cc3694372e407bdfc4e088899fc664c31f42466003a5e37f18167eb46e71f331667
-
memory/800-135-0x0000000000000000-mapping.dmp
-
memory/2660-137-0x0000000000000000-mapping.dmp
-
memory/2660-138-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2660-139-0x0000000005CC0000-0x0000000005D26000-memory.dmpFilesize
408KB
-
memory/2660-140-0x00000000068B0000-0x0000000006900000-memory.dmpFilesize
320KB
-
memory/3768-130-0x00000000002D0000-0x0000000000424000-memory.dmpFilesize
1.3MB
-
memory/3768-131-0x00000000053B0000-0x0000000005954000-memory.dmpFilesize
5.6MB
-
memory/3768-132-0x0000000004E00000-0x0000000004E92000-memory.dmpFilesize
584KB
-
memory/3768-133-0x0000000005200000-0x0000000005212000-memory.dmpFilesize
72KB
-
memory/3768-134-0x00000000052C0000-0x000000000535C000-memory.dmpFilesize
624KB