Analysis
-
max time kernel
107s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
5X40ft Containers.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5X40ft Containers.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Invoice.exe
Resource
win10v2004-20220414-en
General
-
Target
Invoice.exe
-
Size
437KB
-
MD5
aa10879b8f8b00c5078521e6f99db403
-
SHA1
79c7248ef09e66649184d7970c21546b03d5187e
-
SHA256
1cf828a8ad1ca3748535b13a7fea8fad80ded652496afd637ec70aefe2d90fb2
-
SHA512
9838953760719a30696de24939911e451653c0cf191a1e58b71d5b9db2a1f3bab34a2472b941290dd74f669e9f350c1360f522f1809444b41155af20ffe7ad4d
Malware Config
Extracted
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
coronavirus2020
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
coronavirus2020
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/224-132-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Church = "C:\\Users\\Admin\\AppData\\Roaming\\Church\\Church.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Invoice.exedescription pid process target process PID 1076 set thread context of 224 1076 Invoice.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 224 RegSvcs.exe 224 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 224 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 224 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Invoice.exedescription pid process target process PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe PID 1076 wrote to memory of 224 1076 Invoice.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:224
-