Analysis
-
max time kernel
130s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
8100OJ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8100OJ.exe
Resource
win10v2004-20220414-en
General
-
Target
8100OJ.exe
-
Size
1.7MB
-
MD5
bfbdaa4f58a5fb04b5ebd07df65d794c
-
SHA1
626c24e885bca21d7da4f74aabb55e1e6b737a76
-
SHA256
04c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
-
SHA512
5793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/1748-54-0x0000000000150000-0x0000000000302000-memory.dmp family_masslogger \Users\Admin\Desktop\.exe family_masslogger C:\Users\Admin\Desktop\.exe family_masslogger C:\Users\Admin\Desktop\.exe family_masslogger behavioral1/memory/860-70-0x0000000001140000-0x00000000012F2000-memory.dmp family_masslogger \Users\Admin\Desktop\.exe family_masslogger \Users\Admin\Desktop\.exe family_masslogger \Users\Admin\Desktop\.exe family_masslogger \Users\Admin\Desktop\.exe family_masslogger \Users\Admin\Desktop\.exe family_masslogger -
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule \Users\Admin\Desktop\wiseman.exe family_agenttesla \Users\Admin\Desktop\wiseman.exe family_agenttesla C:\Users\Admin\Desktop\wiseman.exe family_agenttesla C:\Users\Admin\Desktop\wiseman.exe family_agenttesla -
Executes dropped EXE 2 IoCs
Processes:
wiseman.exe.exepid process 948 wiseman.exe 860 .exe -
Loads dropped DLL 8 IoCs
Processes:
8100OJ.exeWerFault.exepid process 1748 8100OJ.exe 1748 8100OJ.exe 1748 8100OJ.exe 1184 WerFault.exe 1184 WerFault.exe 1184 WerFault.exe 1184 WerFault.exe 1184 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
wiseman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1184 860 WerFault.exe .exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
8100OJ.exewiseman.exe.exepid process 1748 8100OJ.exe 1748 8100OJ.exe 948 wiseman.exe 948 wiseman.exe 860 .exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
8100OJ.exewiseman.exe.exedescription pid process Token: SeDebugPrivilege 1748 8100OJ.exe Token: SeDebugPrivilege 948 wiseman.exe Token: SeDebugPrivilege 860 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wiseman.exepid process 948 wiseman.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
8100OJ.execmd.exe.exedescription pid process target process PID 1748 wrote to memory of 948 1748 8100OJ.exe wiseman.exe PID 1748 wrote to memory of 948 1748 8100OJ.exe wiseman.exe PID 1748 wrote to memory of 948 1748 8100OJ.exe wiseman.exe PID 1748 wrote to memory of 948 1748 8100OJ.exe wiseman.exe PID 1748 wrote to memory of 1104 1748 8100OJ.exe cmd.exe PID 1748 wrote to memory of 1104 1748 8100OJ.exe cmd.exe PID 1748 wrote to memory of 1104 1748 8100OJ.exe cmd.exe PID 1748 wrote to memory of 1104 1748 8100OJ.exe cmd.exe PID 1104 wrote to memory of 696 1104 cmd.exe reg.exe PID 1104 wrote to memory of 696 1104 cmd.exe reg.exe PID 1104 wrote to memory of 696 1104 cmd.exe reg.exe PID 1104 wrote to memory of 696 1104 cmd.exe reg.exe PID 1748 wrote to memory of 860 1748 8100OJ.exe .exe PID 1748 wrote to memory of 860 1748 8100OJ.exe .exe PID 1748 wrote to memory of 860 1748 8100OJ.exe .exe PID 1748 wrote to memory of 860 1748 8100OJ.exe .exe PID 860 wrote to memory of 1184 860 .exe WerFault.exe PID 860 wrote to memory of 1184 860 .exe WerFault.exe PID 860 wrote to memory of 1184 860 .exe WerFault.exe PID 860 wrote to memory of 1184 860 .exe WerFault.exe -
outlook_office_path 1 IoCs
Processes:
wiseman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
outlook_win_path 1 IoCs
Processes:
wiseman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8100OJ.exe"C:\Users\Admin\AppData\Local\Temp\8100OJ.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\Desktop\wiseman.exe"C:\Users\Admin\Desktop\wiseman.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:696
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 7363⤵
- Loads dropped DLL
- Program crash
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c