Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:51
Static task
static1
Behavioral task
behavioral1
Sample
PO#3459.jpg.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO#3459.jpg.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
PO#68732.png.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
PO#68732.png.exe
Resource
win10v2004-20220414-en
General
-
Target
PO#3459.jpg.exe
-
Size
703KB
-
MD5
518090e39e06e5f3efcebcdf9404183d
-
SHA1
c47e0de5fe58346e3575aab0bbb8af3a638f04c6
-
SHA256
006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
-
SHA512
ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kaysarplastik.com - Port:
587 - Username:
[email protected] - Password:
abdullah123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/836-140-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
Processes:
lux.exeInstallUtil.exepid process 3808 lux.exe 836 InstallUtil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PO#3459.jpg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation PO#3459.jpg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lux = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\lux.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lux.exedescription pid process target process PID 3808 set thread context of 836 3808 lux.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
PO#3459.jpg.exelux.exeInstallUtil.exepid process 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3736 PO#3459.jpg.exe 3808 lux.exe 3808 lux.exe 3808 lux.exe 836 InstallUtil.exe 836 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO#3459.jpg.exelux.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 3736 PO#3459.jpg.exe Token: SeDebugPrivilege 3808 lux.exe Token: SeDebugPrivilege 836 InstallUtil.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
PO#3459.jpg.execmd.exelux.exedescription pid process target process PID 3736 wrote to memory of 4692 3736 PO#3459.jpg.exe cmd.exe PID 3736 wrote to memory of 4692 3736 PO#3459.jpg.exe cmd.exe PID 3736 wrote to memory of 4692 3736 PO#3459.jpg.exe cmd.exe PID 4692 wrote to memory of 4512 4692 cmd.exe reg.exe PID 4692 wrote to memory of 4512 4692 cmd.exe reg.exe PID 4692 wrote to memory of 4512 4692 cmd.exe reg.exe PID 3736 wrote to memory of 3808 3736 PO#3459.jpg.exe lux.exe PID 3736 wrote to memory of 3808 3736 PO#3459.jpg.exe lux.exe PID 3736 wrote to memory of 3808 3736 PO#3459.jpg.exe lux.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe PID 3808 wrote to memory of 836 3808 lux.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO#3459.jpg.exe"C:\Users\Admin\AppData\Local\Temp\PO#3459.jpg.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v lux /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v lux /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"3⤵
- Adds Run key to start application
PID:4512
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\lux.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
703KB
MD5518090e39e06e5f3efcebcdf9404183d
SHA1c47e0de5fe58346e3575aab0bbb8af3a638f04c6
SHA256006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
SHA512ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b
-
Filesize
703KB
MD5518090e39e06e5f3efcebcdf9404183d
SHA1c47e0de5fe58346e3575aab0bbb8af3a638f04c6
SHA256006e2d9f385a7c4d88299832906bf975a311e61ad24fb8b5b1130a9f308cb8c7
SHA512ea436927dfd75d312e96cd8afcd7e8e274d31f9c04d72d1742a323a1a65417b59a04fffd720ed4655730b34cfb48d78d4fa37f3f5e0f3652f003e720dc13cb5b