Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
8100OJ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8100OJ.exe
Resource
win10v2004-20220414-en
General
-
Target
8100OJ.exe
-
Size
1.7MB
-
MD5
bfbdaa4f58a5fb04b5ebd07df65d794c
-
SHA1
626c24e885bca21d7da4f74aabb55e1e6b737a76
-
SHA256
04c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
-
SHA512
5793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
Malware Config
Extracted
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Extracted
agenttesla
Protocol: smtp- Host:
mail.ashpraskills.com - Port:
587 - Username:
[email protected] - Password:
TC041018$4321
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/752-130-0x00000000005F0000-0x00000000007A2000-memory.dmp family_masslogger C:\Users\Admin\Desktop\.exe family_masslogger C:\Users\Admin\Desktop\.exe family_masslogger -
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\wiseman.exe family_agenttesla C:\Users\Admin\Desktop\wiseman.exe family_agenttesla -
Executes dropped EXE 2 IoCs
Processes:
wiseman.exe.exepid process 776 wiseman.exe 5064 .exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8100OJ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 8100OJ.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
wiseman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2080 5064 WerFault.exe .exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
8100OJ.exewiseman.exe.exepid process 752 8100OJ.exe 776 wiseman.exe 776 wiseman.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 752 8100OJ.exe 5064 .exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
8100OJ.exewiseman.exe.exedescription pid process Token: SeDebugPrivilege 752 8100OJ.exe Token: SeDebugPrivilege 776 wiseman.exe Token: SeDebugPrivilege 5064 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wiseman.exepid process 776 wiseman.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8100OJ.execmd.exedescription pid process target process PID 752 wrote to memory of 776 752 8100OJ.exe wiseman.exe PID 752 wrote to memory of 776 752 8100OJ.exe wiseman.exe PID 752 wrote to memory of 776 752 8100OJ.exe wiseman.exe PID 752 wrote to memory of 4528 752 8100OJ.exe cmd.exe PID 752 wrote to memory of 4528 752 8100OJ.exe cmd.exe PID 752 wrote to memory of 4528 752 8100OJ.exe cmd.exe PID 4528 wrote to memory of 1988 4528 cmd.exe reg.exe PID 4528 wrote to memory of 1988 4528 cmd.exe reg.exe PID 4528 wrote to memory of 1988 4528 cmd.exe reg.exe PID 752 wrote to memory of 5064 752 8100OJ.exe .exe PID 752 wrote to memory of 5064 752 8100OJ.exe .exe PID 752 wrote to memory of 5064 752 8100OJ.exe .exe -
outlook_office_path 1 IoCs
Processes:
wiseman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe -
outlook_win_path 1 IoCs
Processes:
wiseman.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wiseman.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8100OJ.exe"C:\Users\Admin\AppData\Local\Temp\8100OJ.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\Desktop\wiseman.exe"C:\Users\Admin\Desktop\wiseman.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v Administrator /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run key to start application
PID:1988
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 12683⤵
- Program crash
PID:2080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5064 -ip 50641⤵PID:888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
1.7MB
MD5bfbdaa4f58a5fb04b5ebd07df65d794c
SHA1626c24e885bca21d7da4f74aabb55e1e6b737a76
SHA25604c7c046518196b6b88e6b3860d870e1ad21728353d8e73f23a9276a1a5e211f
SHA5125793ce56e85b502d20ab43e7d30b5188063cf743b160c385fe85290522a925ad745e10691513ab7014204d93729c22e275bce76313a33c9d19fcdbad4b1f2847
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c
-
Filesize
278KB
MD50922444ce8a37462f57e07a420acf1a7
SHA1a6442229acbd46d3a4cf5f45630ca98a74f18d0f
SHA256bab0b51695e2e35875154c4aba680fd1800dbbba36ef1f48cd437616eac8cdc5
SHA51224cfd983469e0f6926969a9ee9201df6eed891c895ec7db328944feda2ebcbac20c11bffdd15e831aae64dd4d1bf45f442f2be4306d837f045ced245597a6a2c