Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:02
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT MESAJI.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SWIFT MESAJI.exe
Resource
win10v2004-20220414-en
General
-
Target
SWIFT MESAJI.exe
-
Size
785KB
-
MD5
3af69916bb6b831cffe61d3e4c0ad040
-
SHA1
f7c3211c565271054e47a7ea8e9989c887bdeed5
-
SHA256
9aee439e11def97d65bee7c09d7dc567edaae51804fba8ce3478fba0107ed892
-
SHA512
0102153a43d0c94633f3bce75c1afc110a6e93d7daba501e5fbbb2670564ffae82748780e7a82908f83d98c09c0e8edf63b22b1bd996a420823f9519b126d909
Malware Config
Extracted
Protocol: smtp- Host:
mail.albaniandailynews.com - Port:
587 - Username:
[email protected] - Password:
125875.jUkT
Extracted
agenttesla
Protocol: smtp- Host:
mail.albaniandailynews.com - Port:
587 - Username:
[email protected] - Password:
125875.jUkT
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2616-134-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
SWIFT MESAJI.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SWIFT MESAJI.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SWIFT MESAJI.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SWIFT MESAJI.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SWIFT MESAJI.exedescription pid process target process PID 3136 set thread context of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
SWIFT MESAJI.exeSWIFT MESAJI.exepid process 3136 SWIFT MESAJI.exe 3136 SWIFT MESAJI.exe 3136 SWIFT MESAJI.exe 3136 SWIFT MESAJI.exe 3136 SWIFT MESAJI.exe 3136 SWIFT MESAJI.exe 3136 SWIFT MESAJI.exe 2616 SWIFT MESAJI.exe 2616 SWIFT MESAJI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SWIFT MESAJI.exeSWIFT MESAJI.exedescription pid process Token: SeDebugPrivilege 3136 SWIFT MESAJI.exe Token: SeDebugPrivilege 2616 SWIFT MESAJI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SWIFT MESAJI.exepid process 2616 SWIFT MESAJI.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
SWIFT MESAJI.exeSWIFT MESAJI.exedescription pid process target process PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 3136 wrote to memory of 2616 3136 SWIFT MESAJI.exe SWIFT MESAJI.exe PID 2616 wrote to memory of 4616 2616 SWIFT MESAJI.exe netsh.exe PID 2616 wrote to memory of 4616 2616 SWIFT MESAJI.exe netsh.exe PID 2616 wrote to memory of 4616 2616 SWIFT MESAJI.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
SWIFT MESAJI.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SWIFT MESAJI.exe -
outlook_win_path 1 IoCs
Processes:
SWIFT MESAJI.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SWIFT MESAJI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT MESAJI.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT MESAJI.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\SWIFT MESAJI.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2616 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:4616