Analysis
-
max time kernel
152s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:00
Static task
static1
Behavioral task
behavioral1
Sample
prove of payment 7302020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
prove of payment 7302020.exe
Resource
win10v2004-20220414-en
General
-
Target
prove of payment 7302020.exe
-
Size
781KB
-
MD5
334a4702c2d6602a307a9ab03dfd5c33
-
SHA1
4ae1b8a89738d374f6abfc35f4b733057f4fd989
-
SHA256
61f33b4982359531b0f61caee9e5d0abf02413224fa7895d32d4a79ce638c9ad
-
SHA512
4c54e384138d64f72059e47f40a0c6e7886f26bd37a9f9bba32416fc42e5f102d1405712268308718f8d466c0b7d3f500d0641ad88cd919653211dd4de7532bb
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.bnb-spa.com - Port:
587 - Username:
[email protected] - Password:
tPo!47:glt$E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2232-137-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
prove of payment 7302020.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation prove of payment 7302020.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
prove of payment 7302020.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 prove of payment 7302020.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 prove of payment 7302020.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 prove of payment 7302020.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
prove of payment 7302020.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mymp4 = "C:\\Users\\Admin\\AppData\\Roaming\\Mymp4\\Mymp4.exe" prove of payment 7302020.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
prove of payment 7302020.exedescription pid process target process PID 1876 set thread context of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
prove of payment 7302020.exeprove of payment 7302020.exepid process 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 1876 prove of payment 7302020.exe 2232 prove of payment 7302020.exe 2232 prove of payment 7302020.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
prove of payment 7302020.exeprove of payment 7302020.exedescription pid process Token: SeDebugPrivilege 1876 prove of payment 7302020.exe Token: SeDebugPrivilege 2232 prove of payment 7302020.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
prove of payment 7302020.exepid process 2232 prove of payment 7302020.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
prove of payment 7302020.exedescription pid process target process PID 1876 wrote to memory of 2632 1876 prove of payment 7302020.exe schtasks.exe PID 1876 wrote to memory of 2632 1876 prove of payment 7302020.exe schtasks.exe PID 1876 wrote to memory of 2632 1876 prove of payment 7302020.exe schtasks.exe PID 1876 wrote to memory of 4924 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 4924 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 4924 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe PID 1876 wrote to memory of 2232 1876 prove of payment 7302020.exe prove of payment 7302020.exe -
outlook_office_path 1 IoCs
Processes:
prove of payment 7302020.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 prove of payment 7302020.exe -
outlook_win_path 1 IoCs
Processes:
prove of payment 7302020.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 prove of payment 7302020.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\prove of payment 7302020.exe"C:\Users\Admin\AppData\Local\Temp\prove of payment 7302020.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E51.tmp"2⤵
- Creates scheduled task(s)
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\prove of payment 7302020.exe"{path}"2⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\prove of payment 7302020.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611B
MD5bceb1b24038a079a8046db250ce33039
SHA195d2a21b00e5c127f023d2950afe052d2acba572
SHA256d5237a1aac346aaff3cedaca0a567afa529b84a21676e4c7017c9f87cfb32d57
SHA512182dc30cd1e600da9b7ea1ca12860fd82237b04de293899d19ab7edb8b2bcdb37e30d387bbdbb54acdbecdb8200f5a39d417abd91d2b4c11fd126a9e4d0f050e
-
Filesize
1KB
MD5072541fbcc0f05e7e00afb8876087822
SHA10a1a6ad25a4a546520fe21bed23b4dd56f5ea7f5
SHA2568a98b2e2084e096028123a79228bc1b11f12179aecfbe53759b3e0805f973116
SHA51207074f512ee920a787af3d49d982795121051cc5cd1ce01d115aab63cd800fd58f2f57e73dafb96151e57ada9d2e407e370abc9c56d8ab604d118dad93c1412d