Analysis
-
max time kernel
179s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 12:28
Static task
static1
Behavioral task
behavioral1
Sample
bbcrypted.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bbcrypted.exe
Resource
win10v2004-20220414-en
General
-
Target
bbcrypted.exe
-
Size
724KB
-
MD5
0bdce81070764a570057b6381f91c225
-
SHA1
258b9e1189aa620632803aa1ede6cec3c0d7490b
-
SHA256
fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
-
SHA512
3dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1464-150-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
InstallUtil.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts InstallUtil.exe -
Executes dropped EXE 1 IoCs
Processes:
appLaunch.exepid process 1224 appLaunch.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\appLaunch = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\appLaunch.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
appLaunch.exedescription pid process target process PID 1224 set thread context of 1464 1224 appLaunch.exe InstallUtil.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
bbcrypted.exepowershell.exeappLaunch.exeInstallUtil.exepid process 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 844 bbcrypted.exe 764 powershell.exe 764 powershell.exe 1224 appLaunch.exe 1224 appLaunch.exe 1224 appLaunch.exe 1464 InstallUtil.exe 1464 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
bbcrypted.exepowershell.exeappLaunch.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 844 bbcrypted.exe Token: SeDebugPrivilege 764 powershell.exe Token: SeDebugPrivilege 1224 appLaunch.exe Token: SeDebugPrivilege 1464 InstallUtil.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
bbcrypted.execmd.exepowershell.exeappLaunch.exeInstallUtil.exedescription pid process target process PID 844 wrote to memory of 3564 844 bbcrypted.exe cmd.exe PID 844 wrote to memory of 3564 844 bbcrypted.exe cmd.exe PID 844 wrote to memory of 3564 844 bbcrypted.exe cmd.exe PID 3564 wrote to memory of 1480 3564 cmd.exe reg.exe PID 3564 wrote to memory of 1480 3564 cmd.exe reg.exe PID 3564 wrote to memory of 1480 3564 cmd.exe reg.exe PID 844 wrote to memory of 764 844 bbcrypted.exe powershell.exe PID 844 wrote to memory of 764 844 bbcrypted.exe powershell.exe PID 844 wrote to memory of 764 844 bbcrypted.exe powershell.exe PID 764 wrote to memory of 1224 764 powershell.exe appLaunch.exe PID 764 wrote to memory of 1224 764 powershell.exe appLaunch.exe PID 764 wrote to memory of 1224 764 powershell.exe appLaunch.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1224 wrote to memory of 1464 1224 appLaunch.exe InstallUtil.exe PID 1464 wrote to memory of 3364 1464 InstallUtil.exe REG.exe PID 1464 wrote to memory of 3364 1464 InstallUtil.exe REG.exe PID 1464 wrote to memory of 3364 1464 InstallUtil.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbcrypted.exe"C:\Users\Admin\AppData\Local\Temp\bbcrypted.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v appLaunch /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\appLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v appLaunch /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\appLaunch.exe"3⤵
- Adds Run key to start application
PID:1480
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Process C:\Users\Admin\AppData\Roaming\appLaunch.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\appLaunch.exe"C:\Users\Admin\AppData\Roaming\appLaunch.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
PID:3364
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD50bdce81070764a570057b6381f91c225
SHA1258b9e1189aa620632803aa1ede6cec3c0d7490b
SHA256fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
SHA5123dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866
-
Filesize
724KB
MD50bdce81070764a570057b6381f91c225
SHA1258b9e1189aa620632803aa1ede6cec3c0d7490b
SHA256fda9cdc6d189a4f40199d09a2cd49522189e9494d6a7a3dc0d5bdd5faddb355a
SHA5123dc23b61bc6044b99c0438d80aec8697073198731c59762b6e640b9283bd3c21ce9b25e356c4cf263f497ecca573f3d78bac3d56ff6402fb3640212474659866