Analysis
-
max time kernel
174s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:28
Static task
static1
Behavioral task
behavioral1
Sample
bbcrypted.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bbcrypted.exe
Resource
win10v2004-20220414-en
General
-
Target
bbcrypted.exe
-
Size
724KB
-
MD5
0bdce81070764a570057b6381f91c225
-
SHA1
258b9e1189aa620632803aa1ede6cec3c0d7490b
-
SHA256
fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
-
SHA512
3dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
Processes:
appLaunch.exepid process 764 appLaunch.exe -
Loads dropped DLL 1 IoCs
Processes:
powershell.exepid process 948 powershell.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/800-55-0x00000000002E0000-0x00000000002F6000-memory.dmp agile_net behavioral1/memory/764-71-0x0000000000370000-0x0000000000386000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\appLaunch = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\appLaunch.exe" reg.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
bbcrypted.exepowershell.exeappLaunch.exepid process 800 bbcrypted.exe 800 bbcrypted.exe 948 powershell.exe 948 powershell.exe 764 appLaunch.exe 764 appLaunch.exe 764 appLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bbcrypted.exepowershell.exeappLaunch.exedescription pid process Token: SeDebugPrivilege 800 bbcrypted.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 764 appLaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
bbcrypted.execmd.exepowershell.exeappLaunch.exedescription pid process target process PID 800 wrote to memory of 1284 800 bbcrypted.exe cmd.exe PID 800 wrote to memory of 1284 800 bbcrypted.exe cmd.exe PID 800 wrote to memory of 1284 800 bbcrypted.exe cmd.exe PID 800 wrote to memory of 1284 800 bbcrypted.exe cmd.exe PID 1284 wrote to memory of 1700 1284 cmd.exe reg.exe PID 1284 wrote to memory of 1700 1284 cmd.exe reg.exe PID 1284 wrote to memory of 1700 1284 cmd.exe reg.exe PID 1284 wrote to memory of 1700 1284 cmd.exe reg.exe PID 800 wrote to memory of 948 800 bbcrypted.exe powershell.exe PID 800 wrote to memory of 948 800 bbcrypted.exe powershell.exe PID 800 wrote to memory of 948 800 bbcrypted.exe powershell.exe PID 800 wrote to memory of 948 800 bbcrypted.exe powershell.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 948 wrote to memory of 764 948 powershell.exe appLaunch.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe PID 764 wrote to memory of 272 764 appLaunch.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbcrypted.exe"C:\Users\Admin\AppData\Local\Temp\bbcrypted.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v appLaunch /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\appLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v appLaunch /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\appLaunch.exe"3⤵
- Adds Run key to start application
PID:1700
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process C:\Users\Admin\AppData\Roaming\appLaunch.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\appLaunch.exe"C:\Users\Admin\AppData\Roaming\appLaunch.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:272
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD50bdce81070764a570057b6381f91c225
SHA1258b9e1189aa620632803aa1ede6cec3c0d7490b
SHA256fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
SHA5123dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866
-
Filesize
724KB
MD50bdce81070764a570057b6381f91c225
SHA1258b9e1189aa620632803aa1ede6cec3c0d7490b
SHA256fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
SHA5123dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866
-
Filesize
724KB
MD50bdce81070764a570057b6381f91c225
SHA1258b9e1189aa620632803aa1ede6cec3c0d7490b
SHA256fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
SHA5123dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866