Analysis
-
max time kernel
138s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:41
Static task
static1
Behavioral task
behavioral1
Sample
ANNA MARRA HUANGHUA PDA.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ANNA MARRA HUANGHUA PDA.exe
Resource
win10v2004-20220414-en
General
-
Target
ANNA MARRA HUANGHUA PDA.exe
-
Size
1.1MB
-
MD5
c7ec791a102fe6f3b690ea5a119a1fe0
-
SHA1
ff661cd67b47c404fd57331e13c1bad7e9def44a
-
SHA256
9a1a0e1fd423407236adbcec0cb74fa7626215f1b91accc4b9e8aa2f269ff315
-
SHA512
40970ce2cef04178e869341c8f5b8e6c998ab1d6e40fdf1336a4e86ece5b937ca516c4bd1dcfd1fb7e3cdae265b5c47b043e4dd8e10ef23e8749fdd1001a6d72
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
71c7eb1f8ba
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1176-61-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1176-62-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1176-63-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1176-64-0x0000000000446C7E-mapping.dmp family_agenttesla behavioral1/memory/1176-66-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1176-68-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ANNA MARRA HUANGHUA PDA.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ANNA MARRA HUANGHUA PDA.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ANNA MARRA HUANGHUA PDA.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exedescription pid process target process PID 1080 set thread context of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exeANNA MARRA HUANGHUA PDA.exepid process 1080 ANNA MARRA HUANGHUA PDA.exe 1080 ANNA MARRA HUANGHUA PDA.exe 1080 ANNA MARRA HUANGHUA PDA.exe 1080 ANNA MARRA HUANGHUA PDA.exe 1080 ANNA MARRA HUANGHUA PDA.exe 1176 ANNA MARRA HUANGHUA PDA.exe 1176 ANNA MARRA HUANGHUA PDA.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exeANNA MARRA HUANGHUA PDA.exedescription pid process Token: SeDebugPrivilege 1080 ANNA MARRA HUANGHUA PDA.exe Token: SeDebugPrivilege 1176 ANNA MARRA HUANGHUA PDA.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exedescription pid process target process PID 1080 wrote to memory of 852 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 852 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 852 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 852 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe PID 1080 wrote to memory of 1176 1080 ANNA MARRA HUANGHUA PDA.exe ANNA MARRA HUANGHUA PDA.exe -
outlook_office_path 1 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ANNA MARRA HUANGHUA PDA.exe -
outlook_win_path 1 IoCs
Processes:
ANNA MARRA HUANGHUA PDA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ANNA MARRA HUANGHUA PDA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ANNA MARRA HUANGHUA PDA.exe"C:\Users\Admin\AppData\Local\Temp\ANNA MARRA HUANGHUA PDA.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\ANNA MARRA HUANGHUA PDA.exe"{path}"2⤵PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\ANNA MARRA HUANGHUA PDA.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1176
-