Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:27
Static task
static1
Behavioral task
behavioral1
Sample
TRANSFER.scr
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
TRANSFER.scr
Resource
win10v2004-20220414-en
General
-
Target
TRANSFER.scr
-
Size
1.1MB
-
MD5
b3af901e962e7693a2be0ffd2c360538
-
SHA1
6669cd006c13bbf3927063ffe5701bad1b698c3f
-
SHA256
392faa37063ee6a619a3091d1d7a27b8c0d86d35a7f1594720822f8a94ce9d1b
-
SHA512
6976f08cb58d80cb8f819aa105fc2af0f00059d839e8fa9348a8ffd95ccac6a42ad298f500e0a5aafe7c10605080d67ffb260a678d81c0416095461d1d5f5b6f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.northwestpowdercoating.co.uk - Port:
587 - Username:
[email protected] - Password:
C^0z.^LxykTW
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1980-136-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
TRANSFER.scrdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation TRANSFER.scr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
TRANSFER.scrdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 TRANSFER.scr Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 TRANSFER.scr Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 TRANSFER.scr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TRANSFER.scrdescription pid process target process PID 4788 set thread context of 1980 4788 TRANSFER.scr TRANSFER.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
TRANSFER.scrTRANSFER.scrpid process 4788 TRANSFER.scr 4788 TRANSFER.scr 4788 TRANSFER.scr 4788 TRANSFER.scr 4788 TRANSFER.scr 4788 TRANSFER.scr 4788 TRANSFER.scr 1980 TRANSFER.scr 1980 TRANSFER.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
TRANSFER.scrTRANSFER.scrdescription pid process Token: SeDebugPrivilege 4788 TRANSFER.scr Token: SeDebugPrivilege 1980 TRANSFER.scr -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
TRANSFER.scrdescription pid process target process PID 4788 wrote to memory of 540 4788 TRANSFER.scr schtasks.exe PID 4788 wrote to memory of 540 4788 TRANSFER.scr schtasks.exe PID 4788 wrote to memory of 540 4788 TRANSFER.scr schtasks.exe PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr PID 4788 wrote to memory of 1980 4788 TRANSFER.scr TRANSFER.scr -
outlook_office_path 1 IoCs
Processes:
TRANSFER.scrdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 TRANSFER.scr -
outlook_win_path 1 IoCs
Processes:
TRANSFER.scrdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 TRANSFER.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\TRANSFER.scr"C:\Users\Admin\AppData\Local\Temp\TRANSFER.scr" /S1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9366.tmp"2⤵
- Creates scheduled task(s)
PID:540 -
C:\Users\Admin\AppData\Local\Temp\TRANSFER.scr"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611B
MD5bceb1b24038a079a8046db250ce33039
SHA195d2a21b00e5c127f023d2950afe052d2acba572
SHA256d5237a1aac346aaff3cedaca0a567afa529b84a21676e4c7017c9f87cfb32d57
SHA512182dc30cd1e600da9b7ea1ca12860fd82237b04de293899d19ab7edb8b2bcdb37e30d387bbdbb54acdbecdb8200f5a39d417abd91d2b4c11fd126a9e4d0f050e
-
Filesize
1KB
MD5072541fbcc0f05e7e00afb8876087822
SHA10a1a6ad25a4a546520fe21bed23b4dd56f5ea7f5
SHA2568a98b2e2084e096028123a79228bc1b11f12179aecfbe53759b3e0805f973116
SHA51207074f512ee920a787af3d49d982795121051cc5cd1ce01d115aab63cd800fd58f2f57e73dafb96151e57ada9d2e407e370abc9c56d8ab604d118dad93c1412d