Analysis
-
max time kernel
88s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 03:37
Static task
static1
Behavioral task
behavioral1
Sample
SOA JUNE.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SOA JUNE.exe
Resource
win10v2004-20220414-en
General
-
Target
SOA JUNE.exe
-
Size
278KB
-
MD5
579dbd7afd440e6a10a8b5d272c7c2a8
-
SHA1
2bd47ba70ec1d1016fbf221fe7195ccb7d114f53
-
SHA256
79d51a9e744eec6fdd7ccb78990d82fece2221773065e45989c85c87485ba741
-
SHA512
4217581d5e014dfffdf2e6b0106bece38881a31cb8f7cd02c7310178983942627e699536182b212d898510b4b5b1cce7702d41ab8e75ccc9a1522f17024ae4da
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mahavirint.in - Port:
587 - Username:
[email protected] - Password:
pratapjain
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1596-54-0x0000000000220000-0x000000000026C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
SOA JUNE.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts SOA JUNE.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
SOA JUNE.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOA JUNE.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOA JUNE.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOA JUNE.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SOA JUNE.exepid process 1596 SOA JUNE.exe 1596 SOA JUNE.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SOA JUNE.exedescription pid process Token: SeDebugPrivilege 1596 SOA JUNE.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SOA JUNE.exedescription pid process target process PID 1596 wrote to memory of 1832 1596 SOA JUNE.exe REG.exe PID 1596 wrote to memory of 1832 1596 SOA JUNE.exe REG.exe PID 1596 wrote to memory of 1832 1596 SOA JUNE.exe REG.exe PID 1596 wrote to memory of 1832 1596 SOA JUNE.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
SOA JUNE.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOA JUNE.exe -
outlook_win_path 1 IoCs
Processes:
SOA JUNE.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOA JUNE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA JUNE.exe"C:\Users\Admin\AppData\Local\Temp\SOA JUNE.exe"1⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1596 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f2⤵
- Modifies registry key
PID:1832
-