Analysis
-
max time kernel
183s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
Payment Proof.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Proof.exe
Resource
win10v2004-20220414-en
General
-
Target
Payment Proof.exe
-
Size
698KB
-
MD5
9abb6b056df5fd1948ed0008fa402705
-
SHA1
5a6316760d1fc70edac6b78335ba08683e581090
-
SHA256
23238fe2dfccd6e140916ab34d11a4b42b84f485e02c102c58b696a11bd3e453
-
SHA512
2b91484958d25d05d9d13bad98fa8cd9d3e4847cb5a219718d5adce9068e510949fe28b56597534ae638a2925d04bf387b81aa98f0914b6b5806cf7a121440d1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.taiemerica.com - Port:
587 - Username:
[email protected] - Password:
JuCbr%o3
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4940-136-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
Payment Proof.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Payment Proof.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Payment Proof.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Proof.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Proof.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Proof.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Proof.exedescription pid process target process PID 1888 set thread context of 4940 1888 Payment Proof.exe Payment Proof.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Payment Proof.exePayment Proof.exepid process 1888 Payment Proof.exe 1888 Payment Proof.exe 1888 Payment Proof.exe 1888 Payment Proof.exe 1888 Payment Proof.exe 1888 Payment Proof.exe 1888 Payment Proof.exe 4940 Payment Proof.exe 4940 Payment Proof.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Proof.exePayment Proof.exedescription pid process Token: SeDebugPrivilege 1888 Payment Proof.exe Token: SeDebugPrivilege 4940 Payment Proof.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Payment Proof.exePayment Proof.exedescription pid process target process PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 1888 wrote to memory of 4940 1888 Payment Proof.exe Payment Proof.exe PID 4940 wrote to memory of 4452 4940 Payment Proof.exe REG.exe PID 4940 wrote to memory of 4452 4940 Payment Proof.exe REG.exe PID 4940 wrote to memory of 4452 4940 Payment Proof.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
Payment Proof.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Proof.exe -
outlook_win_path 1 IoCs
Processes:
Payment Proof.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Proof.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Proof.exe"C:\Users\Admin\AppData\Local\Temp\Payment Proof.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Payment Proof.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4940 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:4452