Analysis
-
max time kernel
135s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:51
Static task
static1
Behavioral task
behavioral1
Sample
PO#3459.jpg.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO#3459.jpg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
PO#68732.png.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
PO#68732.png.exe
Resource
win10v2004-20220414-en
General
-
Target
PO#3459.jpg.exe
-
Size
703KB
-
MD5
518090e39e06e5f3efcebcdf9404183d
-
SHA1
c47e0de5fe58346e3575aab0bbb8af3a638f04c6
-
SHA256
006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
-
SHA512
ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kaysarplastik.com - Port:
587 - Username:
[email protected] - Password:
abdullah123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
resource yara_rule behavioral1/memory/1532-70-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1532-71-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1532-72-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1532-73-0x000000000044705E-mapping.dmp family_agenttesla behavioral1/memory/1532-76-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1532-78-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 1720 lux.exe 1532 InstallUtil.exe -
Loads dropped DLL 2 IoCs
pid Process 892 PO#3459.jpg.exe 1720 lux.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/892-56-0x00000000005E0000-0x00000000005EA000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\lux = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\lux.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 1532 1720 lux.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 892 PO#3459.jpg.exe 892 PO#3459.jpg.exe 1720 lux.exe 1720 lux.exe 1720 lux.exe 1532 InstallUtil.exe 1532 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 892 PO#3459.jpg.exe Token: SeDebugPrivilege 1720 lux.exe Token: SeDebugPrivilege 1532 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 892 wrote to memory of 2044 892 PO#3459.jpg.exe 27 PID 892 wrote to memory of 2044 892 PO#3459.jpg.exe 27 PID 892 wrote to memory of 2044 892 PO#3459.jpg.exe 27 PID 892 wrote to memory of 2044 892 PO#3459.jpg.exe 27 PID 2044 wrote to memory of 2000 2044 cmd.exe 29 PID 2044 wrote to memory of 2000 2044 cmd.exe 29 PID 2044 wrote to memory of 2000 2044 cmd.exe 29 PID 2044 wrote to memory of 2000 2044 cmd.exe 29 PID 892 wrote to memory of 1720 892 PO#3459.jpg.exe 30 PID 892 wrote to memory of 1720 892 PO#3459.jpg.exe 30 PID 892 wrote to memory of 1720 892 PO#3459.jpg.exe 30 PID 892 wrote to memory of 1720 892 PO#3459.jpg.exe 30 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31 PID 1720 wrote to memory of 1532 1720 lux.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO#3459.jpg.exe"C:\Users\Admin\AppData\Local\Temp\PO#3459.jpg.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v lux /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v lux /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"3⤵
- Adds Run key to start application
PID:2000
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
703KB
MD5518090e39e06e5f3efcebcdf9404183d
SHA1c47e0de5fe58346e3575aab0bbb8af3a638f04c6
SHA256006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
SHA512ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b
-
Filesize
703KB
MD5518090e39e06e5f3efcebcdf9404183d
SHA1c47e0de5fe58346e3575aab0bbb8af3a638f04c6
SHA256006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
SHA512ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
703KB
MD5518090e39e06e5f3efcebcdf9404183d
SHA1c47e0de5fe58346e3575aab0bbb8af3a638f04c6
SHA256006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
SHA512ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b