Analysis
-
max time kernel
129s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:26
Static task
static1
Behavioral task
behavioral1
Sample
Delivery Note AWD-29383737383-3736783833.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Delivery Note AWD-29383737383-3736783833.exe
Resource
win10v2004-20220414-en
General
-
Target
Delivery Note AWD-29383737383-3736783833.exe
-
Size
701KB
-
MD5
92c1e6f3ae1ff35dd61e1d86252dc905
-
SHA1
4e88fe64b1c3f610758a2adcf816badd73a02da1
-
SHA256
1c0d5a3dc1ac2c2b4a3eca709767ac255b6d73fc1a7f24181ff58627343f7dac
-
SHA512
b088de9a4daaff4ffd275ff4eb534e9beb27b4e189ddb3f1f29c504878f478834ed596e7795f347bc25b563dfb139375936882d11804f7d6596197788bfdc5c6
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.airporations.com/ - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Protocol: ftp- Host:
ftp://ftp.airporations.com/ - Port:
21 - Username:
[email protected] - Password:
boygirl123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1716-61-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1716-62-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1716-63-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1716-64-0x0000000000446DEE-mapping.dmp family_agenttesla behavioral1/memory/1716-66-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1716-68-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Delivery Note AWD-29383737383-3736783833.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Delivery Note AWD-29383737383-3736783833.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Delivery Note AWD-29383737383-3736783833.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exedescription pid process target process PID 1460 set thread context of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exepid process 1716 Delivery Note AWD-29383737383-3736783833.exe 1716 Delivery Note AWD-29383737383-3736783833.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exedescription pid process Token: SeDebugPrivilege 1716 Delivery Note AWD-29383737383-3736783833.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exedescription pid process target process PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe PID 1460 wrote to memory of 1716 1460 Delivery Note AWD-29383737383-3736783833.exe Delivery Note AWD-29383737383-3736783833.exe -
outlook_office_path 1 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Delivery Note AWD-29383737383-3736783833.exe -
outlook_win_path 1 IoCs
Processes:
Delivery Note AWD-29383737383-3736783833.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Delivery Note AWD-29383737383-3736783833.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Delivery Note AWD-29383737383-3736783833.exe"C:\Users\Admin\AppData\Local\Temp\Delivery Note AWD-29383737383-3736783833.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Delivery Note AWD-29383737383-3736783833.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1716