Analysis
-
max time kernel
193s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:50
Static task
static1
Behavioral task
behavioral1
Sample
Please Confirm Your Shipment Address.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Please Confirm Your Shipment Address.exe
Resource
win10v2004-20220414-en
General
-
Target
Please Confirm Your Shipment Address.exe
-
Size
4.6MB
-
MD5
ffab58789a8d188f10ae6b7a9c73c36a
-
SHA1
48bf4df2095bf4bb8fa53ddd10fbb0fef80dc494
-
SHA256
f93ca4cd3ed07276972b89aee75211d52551197a2d1c5c8c3f01ed85aa13a4ea
-
SHA512
c13ff615c4ae03dd33a5c4766be184c029aef24560703b8f59cf9fa54755dd9d68589234919ac4d02c77a05480f4c3795c53a1283cda1583ced8ea93f7dd322c
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
Processes:
Mecury.exepid process 3172 Mecury.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Please Confirm Your Shipment Address.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Please Confirm Your Shipment Address.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Processs = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Local\\Mecury.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
Please Confirm Your Shipment Address.exeMecury.exepid process 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 4352 Please Confirm Your Shipment Address.exe 3172 Mecury.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Please Confirm Your Shipment Address.exeMecury.exedescription pid process Token: SeDebugPrivilege 4352 Please Confirm Your Shipment Address.exe Token: SeDebugPrivilege 3172 Mecury.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Please Confirm Your Shipment Address.execmd.exedescription pid process target process PID 4352 wrote to memory of 4340 4352 Please Confirm Your Shipment Address.exe cmd.exe PID 4352 wrote to memory of 4340 4352 Please Confirm Your Shipment Address.exe cmd.exe PID 4352 wrote to memory of 4340 4352 Please Confirm Your Shipment Address.exe cmd.exe PID 4340 wrote to memory of 4964 4340 cmd.exe reg.exe PID 4340 wrote to memory of 4964 4340 cmd.exe reg.exe PID 4340 wrote to memory of 4964 4340 cmd.exe reg.exe PID 4352 wrote to memory of 3172 4352 Please Confirm Your Shipment Address.exe Mecury.exe PID 4352 wrote to memory of 3172 4352 Please Confirm Your Shipment Address.exe Mecury.exe PID 4352 wrote to memory of 3172 4352 Please Confirm Your Shipment Address.exe Mecury.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Please Confirm Your Shipment Address.exe"C:\Users\Admin\AppData\Local\Temp\Please Confirm Your Shipment Address.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Processs /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Local\Mecury.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Processs /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Local\Mecury.exe"3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Mecury.exe"C:\Users\Admin\AppData\Local\Mecury.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mecury.exeFilesize
4.6MB
MD5ffab58789a8d188f10ae6b7a9c73c36a
SHA148bf4df2095bf4bb8fa53ddd10fbb0fef80dc494
SHA256f93ca4cd3ed07276972b89aee75211d52551197a2d1c5c8c3f01ed85aa13a4ea
SHA512c13ff615c4ae03dd33a5c4766be184c029aef24560703b8f59cf9fa54755dd9d68589234919ac4d02c77a05480f4c3795c53a1283cda1583ced8ea93f7dd322c
-
C:\Users\Admin\AppData\Local\Mecury.exeFilesize
4.6MB
MD5ffab58789a8d188f10ae6b7a9c73c36a
SHA148bf4df2095bf4bb8fa53ddd10fbb0fef80dc494
SHA256f93ca4cd3ed07276972b89aee75211d52551197a2d1c5c8c3f01ed85aa13a4ea
SHA512c13ff615c4ae03dd33a5c4766be184c029aef24560703b8f59cf9fa54755dd9d68589234919ac4d02c77a05480f4c3795c53a1283cda1583ced8ea93f7dd322c
-
memory/3172-136-0x0000000000000000-mapping.dmp
-
memory/4340-134-0x0000000000000000-mapping.dmp
-
memory/4352-130-0x0000000000010000-0x00000000004B6000-memory.dmpFilesize
4.6MB
-
memory/4352-131-0x0000000005B20000-0x00000000060C4000-memory.dmpFilesize
5.6MB
-
memory/4352-132-0x0000000005610000-0x00000000056A2000-memory.dmpFilesize
584KB
-
memory/4352-133-0x0000000005A40000-0x0000000005A84000-memory.dmpFilesize
272KB
-
memory/4964-135-0x0000000000000000-mapping.dmp