Analysis
-
max time kernel
116s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Document PL&BL Draft.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Shipping Document PL&BL Draft.exe
Resource
win10v2004-20220414-en
General
-
Target
Shipping Document PL&BL Draft.exe
-
Size
729KB
-
MD5
09e44e025eaa6142784bead6ff8c19d7
-
SHA1
f81f3fddcf53b31fbd5d41b5b193bcafb66f09e8
-
SHA256
c59a459f5eb1b870adcca4d628a92d1ddf207528dae3d1942809cf798a07868f
-
SHA512
be501c95e1f2ab944373e2d5c72f92d58c4cff2c9565a0304e018e7d479f44213d4410fb1ec1ef84b35a9bd3b83af0d1a6d4bad1b395f0ff80bac5cbbae9620a
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/976-54-0x0000000000270000-0x000000000032C000-memory.dmp family_agenttesla behavioral1/memory/912-63-0x0000000000080000-0x00000000000D0000-memory.dmp family_agenttesla behavioral1/memory/912-64-0x0000000000080000-0x00000000000D0000-memory.dmp family_agenttesla behavioral1/memory/912-66-0x000000000044B3FE-mapping.dmp family_agenttesla behavioral1/memory/912-67-0x0000000000080000-0x00000000000D0000-memory.dmp family_agenttesla behavioral1/memory/912-68-0x0000000000080000-0x00000000000D0000-memory.dmp family_agenttesla behavioral1/memory/912-72-0x0000000000080000-0x00000000000D0000-memory.dmp family_agenttesla behavioral1/memory/912-75-0x0000000000080000-0x00000000000D0000-memory.dmp family_agenttesla -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/976-55-0x00000000001B0000-0x00000000001C6000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Shipping Document PL&BL Draft.exedescription pid process target process PID 976 set thread context of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Shipping Document PL&BL Draft.exeShipping Document PL&BL Draft.exepid process 976 Shipping Document PL&BL Draft.exe 976 Shipping Document PL&BL Draft.exe 976 Shipping Document PL&BL Draft.exe 912 Shipping Document PL&BL Draft.exe 912 Shipping Document PL&BL Draft.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Shipping Document PL&BL Draft.exeShipping Document PL&BL Draft.exedescription pid process Token: SeDebugPrivilege 976 Shipping Document PL&BL Draft.exe Token: SeDebugPrivilege 912 Shipping Document PL&BL Draft.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Shipping Document PL&BL Draft.exedescription pid process target process PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 976 wrote to memory of 912 976 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-