Analysis
-
max time kernel
111s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:52
Static task
static1
Behavioral task
behavioral1
Sample
Statement Account - MAY 2020-pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Statement Account - MAY 2020-pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
Statement Account - MAY 2020-pdf.exe
-
Size
755KB
-
MD5
fbb290fd8d65ca723cf81a9f9ed20c02
-
SHA1
b73f0725cb29eb6f1abcc3ea86f792f8d3c2d8b0
-
SHA256
d146eb20c0c3745f4e74267f468a4fc870c1639b48bdd634d10f82856e7b59e9
-
SHA512
ccfaee8f96a8b6753a965e0eda2c49a81d4d7c5ec1c901bab38d7db2ebb446acca62600c8e4ceeb3ba8b87bb293c8dfc7e872ab38c96e9b6363eac07d2d06c7b
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hitechnocrats.com - Port:
587 - Username:
[email protected] - Password:
tnbJ_YL&GmP}
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-58-0x0000000001D20000-0x0000000001D72000-memory.dmp family_agenttesla behavioral1/memory/1404-60-0x0000000001D20000-0x0000000001D72000-memory.dmp family_agenttesla -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payment.vbs notepad.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Statement Account - MAY 2020-pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement Account - MAY 2020-pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement Account - MAY 2020-pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement Account - MAY 2020-pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Statement Account - MAY 2020-pdf.exedescription pid process target process PID 1396 set thread context of 1404 1396 Statement Account - MAY 2020-pdf.exe Statement Account - MAY 2020-pdf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Statement Account - MAY 2020-pdf.exeStatement Account - MAY 2020-pdf.exepid process 1396 Statement Account - MAY 2020-pdf.exe 1404 Statement Account - MAY 2020-pdf.exe 1404 Statement Account - MAY 2020-pdf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Statement Account - MAY 2020-pdf.exepid process 1396 Statement Account - MAY 2020-pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Statement Account - MAY 2020-pdf.exedescription pid process Token: SeDebugPrivilege 1404 Statement Account - MAY 2020-pdf.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Statement Account - MAY 2020-pdf.exeStatement Account - MAY 2020-pdf.exedescription pid process target process PID 1396 wrote to memory of 956 1396 Statement Account - MAY 2020-pdf.exe notepad.exe PID 1396 wrote to memory of 956 1396 Statement Account - MAY 2020-pdf.exe notepad.exe PID 1396 wrote to memory of 956 1396 Statement Account - MAY 2020-pdf.exe notepad.exe PID 1396 wrote to memory of 956 1396 Statement Account - MAY 2020-pdf.exe notepad.exe PID 1396 wrote to memory of 956 1396 Statement Account - MAY 2020-pdf.exe notepad.exe PID 1396 wrote to memory of 956 1396 Statement Account - MAY 2020-pdf.exe notepad.exe PID 1396 wrote to memory of 1404 1396 Statement Account - MAY 2020-pdf.exe Statement Account - MAY 2020-pdf.exe PID 1396 wrote to memory of 1404 1396 Statement Account - MAY 2020-pdf.exe Statement Account - MAY 2020-pdf.exe PID 1396 wrote to memory of 1404 1396 Statement Account - MAY 2020-pdf.exe Statement Account - MAY 2020-pdf.exe PID 1396 wrote to memory of 1404 1396 Statement Account - MAY 2020-pdf.exe Statement Account - MAY 2020-pdf.exe PID 1404 wrote to memory of 820 1404 Statement Account - MAY 2020-pdf.exe netsh.exe PID 1404 wrote to memory of 820 1404 Statement Account - MAY 2020-pdf.exe netsh.exe PID 1404 wrote to memory of 820 1404 Statement Account - MAY 2020-pdf.exe netsh.exe PID 1404 wrote to memory of 820 1404 Statement Account - MAY 2020-pdf.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
Statement Account - MAY 2020-pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement Account - MAY 2020-pdf.exe -
outlook_win_path 1 IoCs
Processes:
Statement Account - MAY 2020-pdf.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement Account - MAY 2020-pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement Account - MAY 2020-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Statement Account - MAY 2020-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\Statement Account - MAY 2020-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Statement Account - MAY 2020-pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1404 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:820
-
-