Analysis
-
max time kernel
152s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
yUJ6pfrBT92ChKS.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
yUJ6pfrBT92ChKS.exe
Resource
win10v2004-20220414-en
General
-
Target
yUJ6pfrBT92ChKS.exe
-
Size
529KB
-
MD5
8c32f596fbd2f52b34d1c891a0559493
-
SHA1
67b0750eef95d840137b274a0c486c7cb63a0601
-
SHA256
25387e5ca0782bee6e0d9aa279453187cbee9d86bfa0fca6246725ff20f45f92
-
SHA512
9b627e1377bb4ef33de88ab2ab62de22222f53e625793cdff218526afe78e105b140fc997de06639a26b85fc57852a0d3fcd7481ae4d838a42cc5b1dbb7625c0
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rajalakshmi.co.in - Port:
587 - Username:
[email protected] - Password:
009_DESign1*
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1824-64-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla behavioral1/memory/1824-65-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla behavioral1/memory/1824-67-0x00000000004491EE-mapping.dmp family_agenttesla behavioral1/memory/1824-66-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla behavioral1/memory/1824-69-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla behavioral1/memory/1824-71-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
yUJ6pfrBT92ChKS.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yUJ6pfrBT92ChKS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yUJ6pfrBT92ChKS.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
yUJ6pfrBT92ChKS.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum yUJ6pfrBT92ChKS.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 yUJ6pfrBT92ChKS.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
yUJ6pfrBT92ChKS.exedescription pid process target process PID 1276 set thread context of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
yUJ6pfrBT92ChKS.exeyUJ6pfrBT92ChKS.exepid process 1276 yUJ6pfrBT92ChKS.exe 1276 yUJ6pfrBT92ChKS.exe 1276 yUJ6pfrBT92ChKS.exe 1276 yUJ6pfrBT92ChKS.exe 1824 yUJ6pfrBT92ChKS.exe 1824 yUJ6pfrBT92ChKS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
yUJ6pfrBT92ChKS.exeyUJ6pfrBT92ChKS.exedescription pid process Token: SeDebugPrivilege 1276 yUJ6pfrBT92ChKS.exe Token: SeDebugPrivilege 1824 yUJ6pfrBT92ChKS.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
yUJ6pfrBT92ChKS.exedescription pid process target process PID 1276 wrote to memory of 912 1276 yUJ6pfrBT92ChKS.exe schtasks.exe PID 1276 wrote to memory of 912 1276 yUJ6pfrBT92ChKS.exe schtasks.exe PID 1276 wrote to memory of 912 1276 yUJ6pfrBT92ChKS.exe schtasks.exe PID 1276 wrote to memory of 912 1276 yUJ6pfrBT92ChKS.exe schtasks.exe PID 1276 wrote to memory of 1072 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1072 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1072 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1072 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe PID 1276 wrote to memory of 1824 1276 yUJ6pfrBT92ChKS.exe yUJ6pfrBT92ChKS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\yUJ6pfrBT92ChKS.exe"C:\Users\Admin\AppData\Local\Temp\yUJ6pfrBT92ChKS.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\loggsPtbbRAy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAC76.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\yUJ6pfrBT92ChKS.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\yUJ6pfrBT92ChKS.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpAC76.tmpFilesize
1KB
MD53c81a2d51b35176bfb201d31d7877256
SHA153b326fdbec6aeaa2da37eb5ca0919d3c161107a
SHA256657f16a6e7eb78dc0f6ab6bcc776d226c1e8995a9ae3e07453dfb889e5b7747f
SHA512814de2e71788dabb4a410250dc0f7dbe8d4d7d8397bff674c01c326e080166501860285a7834f4c2cb68279198d8983e81a031bc9c7fcef68ceee1ab3b6e387d
-
memory/912-59-0x0000000000000000-mapping.dmp
-
memory/1276-57-0x0000000002120000-0x0000000002186000-memory.dmpFilesize
408KB
-
memory/1276-54-0x0000000000C40000-0x0000000000CCA000-memory.dmpFilesize
552KB
-
memory/1276-58-0x00000000003D0000-0x000000000041E000-memory.dmpFilesize
312KB
-
memory/1276-56-0x00000000004E0000-0x00000000004F0000-memory.dmpFilesize
64KB
-
memory/1276-55-0x00000000756E1000-0x00000000756E3000-memory.dmpFilesize
8KB
-
memory/1824-61-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1824-62-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1824-64-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1824-65-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1824-67-0x00000000004491EE-mapping.dmp
-
memory/1824-66-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1824-69-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1824-71-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB