Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 12:00
Behavioral task
behavioral1
Sample
0080900000000000004.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0080900000000000004.exe
Resource
win10v2004-20220414-en
General
-
Target
0080900000000000004.exe
-
Size
508KB
-
MD5
697e07591d78360f5544a6d5d6f7cf65
-
SHA1
6462fa2d20234ebe218d43126d0b3e0d407e868c
-
SHA256
9af31d18ef5af8d20ed75f9cc76185d119990e2adea7748c16562359a1dc3d5d
-
SHA512
484e69510061cd2a6a9b7188de95c2b0c8c421f09a342ae505f671aa59f08f733fbf695c3e7af390b8357be5ff678e5472ec4755ab0f63a8c7e36806d5881948
Malware Config
Extracted
Protocol: smtp- Host:
smtp.ionos.mx - Port:
587 - Username:
[email protected] - Password:
lp475869
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.mx - Port:
587 - Username:
[email protected] - Password:
lp475869
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
SnakeBOT
SnakeBOT is a heavily obfuscated .NET downloader.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3944-138-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Contains SnakeBOT related strings 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3440-130-0x0000000000640000-0x00000000006C8000-memory.dmp snakebot_strings -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0080900000000000004.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 0080900000000000004.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
0080900000000000004.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0080900000000000004.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0080900000000000004.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0080900000000000004.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0080900000000000004.exedescription pid process target process PID 3440 set thread context of 3944 3440 0080900000000000004.exe 0080900000000000004.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0080900000000000004.exepid process 3944 0080900000000000004.exe 3944 0080900000000000004.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0080900000000000004.exe0080900000000000004.exedescription pid process Token: SeDebugPrivilege 3440 0080900000000000004.exe Token: SeDebugPrivilege 3944 0080900000000000004.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0080900000000000004.exepid process 3440 0080900000000000004.exe 3440 0080900000000000004.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
0080900000000000004.exe0080900000000000004.exedescription pid process target process PID 3440 wrote to memory of 872 3440 0080900000000000004.exe schtasks.exe PID 3440 wrote to memory of 872 3440 0080900000000000004.exe schtasks.exe PID 3440 wrote to memory of 872 3440 0080900000000000004.exe schtasks.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3440 wrote to memory of 3944 3440 0080900000000000004.exe 0080900000000000004.exe PID 3944 wrote to memory of 1224 3944 0080900000000000004.exe netsh.exe PID 3944 wrote to memory of 1224 3944 0080900000000000004.exe netsh.exe PID 3944 wrote to memory of 1224 3944 0080900000000000004.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
0080900000000000004.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0080900000000000004.exe -
outlook_win_path 1 IoCs
Processes:
0080900000000000004.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0080900000000000004.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0080900000000000004.exe"C:\Users\Admin\AppData\Local\Temp\0080900000000000004.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LsoUSx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp665B.tmp"2⤵
- Creates scheduled task(s)
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\0080900000000000004.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3944 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1224
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57f96a2028a2f1d89df17b47402066b26
SHA1ec54d1bc9bba41287d7f90bd0e8308bcd6b6ea49
SHA25631953916152219586146518510c58c17a262eea5afc76312dcdd8c91910096c4
SHA5128685e689d2c084c2d1b978c166fc19757e4a31b030acabe80f4613c3b875407babad642f809cae1d107b7733a36117ca1b89a73a08c1f7c5d0705d12e31e2b88