Analysis
-
max time kernel
127s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
FINAL SHIPPING DOCS.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
FINAL SHIPPING DOCS.exe
Resource
win10v2004-20220414-en
General
-
Target
FINAL SHIPPING DOCS.exe
-
Size
711KB
-
MD5
7e55d24c0f8c1eede0c92de6eaf638f2
-
SHA1
4ca3308afd73d550567395fbb10e1f9a5400ba5b
-
SHA256
606d39731ffeb838a7e31286cf75dba0c3ac101984e9c95cbeafd284d5e25671
-
SHA512
3a8136603025b2bbb3bfe13dbcec068196db19fa3f4353d3af9de19f76f471324137737aceb3b6a1111f525176e587d7f0d81b998b44ad31dbf848fc0de3936d
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.el-sever.com - Port:
587 - Username:
[email protected] - Password:
admin123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/32-136-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FINAL SHIPPING DOCS.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation FINAL SHIPPING DOCS.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CJzRAE = "C:\\Users\\Admin\\AppData\\Roaming\\CJzRAE\\CJzRAE.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
FINAL SHIPPING DOCS.exedescription pid process target process PID 4412 set thread context of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
FINAL SHIPPING DOCS.exeRegSvcs.exepid process 4412 FINAL SHIPPING DOCS.exe 4412 FINAL SHIPPING DOCS.exe 4412 FINAL SHIPPING DOCS.exe 4412 FINAL SHIPPING DOCS.exe 32 RegSvcs.exe 32 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
FINAL SHIPPING DOCS.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4412 FINAL SHIPPING DOCS.exe Token: SeDebugPrivilege 32 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
FINAL SHIPPING DOCS.exedescription pid process target process PID 4412 wrote to memory of 2652 4412 FINAL SHIPPING DOCS.exe schtasks.exe PID 4412 wrote to memory of 2652 4412 FINAL SHIPPING DOCS.exe schtasks.exe PID 4412 wrote to memory of 2652 4412 FINAL SHIPPING DOCS.exe schtasks.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe PID 4412 wrote to memory of 32 4412 FINAL SHIPPING DOCS.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FINAL SHIPPING DOCS.exe"C:\Users\Admin\AppData\Local\Temp\FINAL SHIPPING DOCS.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE2EE.tmp"2⤵
- Creates scheduled task(s)
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:32
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54aa7d4126cf14e812f5bb881ec9442d0
SHA1753f1873b92987a4d9d47d14555b0022ee25431b
SHA2565864ffbfd512ba8a57ef045a45be0bdbd76e0f49aae6425959a9154c453cd9c6
SHA512014a3a18e8e1667c1324658c0a7a3f7b83283d9a50c2fd47c92ad420df152c8e93b6517be2d22cc5bea741edffea202a899edc95ef43f9ec2ef940f34a29c3b6