Analysis

  • max time kernel
    134s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 23:49

General

  • Target

    Remittance copy.exe

  • Size

    729KB

  • MD5

    c86e1314d84055040470216e546648df

  • SHA1

    575a0bd92de0286999ad125f4e32acfe0e19a834

  • SHA256

    51031d05083e587fa113208a5de4c7f7c0bd4f6ee385bdfee92c63786f7d7e88

  • SHA512

    0a27c34593318a460f31f568e3ef9739f6778884720d8ac65b623db8bcf1df2f28d16ae52af2deb3109a7a943222dcf704ceaeffd1a7e15165651a96fa7d2f5f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.jascf.org
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    v4Sh@2P$keSd

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Remittance copy.exe
    "C:\Users\Admin\AppData\Local\Temp\Remittance copy.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "{path}"
      2⤵
        PID:3196
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        2⤵
          PID:448
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "{path}"
          2⤵
          • Drops file in Drivers directory
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • outlook_office_path
          • outlook_win_path
          PID:540
          • C:\Windows\SysWOW64\REG.exe
            REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f
            3⤵
            • Modifies registry key
            PID:2360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/448-136-0x0000000000000000-mapping.dmp

      • memory/540-139-0x00000000059D0000-0x0000000005A36000-memory.dmp

        Filesize

        408KB

      • memory/540-137-0x0000000000000000-mapping.dmp

      • memory/540-138-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/540-140-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/540-142-0x0000000006750000-0x000000000675A000-memory.dmp

        Filesize

        40KB

      • memory/2360-141-0x0000000000000000-mapping.dmp

      • memory/3196-135-0x0000000000000000-mapping.dmp

      • memory/4744-132-0x0000000005960000-0x00000000059F2000-memory.dmp

        Filesize

        584KB

      • memory/4744-133-0x0000000006590000-0x0000000006716000-memory.dmp

        Filesize

        1.5MB

      • memory/4744-134-0x0000000006400000-0x000000000649C000-memory.dmp

        Filesize

        624KB

      • memory/4744-131-0x0000000005E50000-0x00000000063F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4744-130-0x0000000000EF0000-0x0000000000FAC000-memory.dmp

        Filesize

        752KB