Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 18:43
Static task
static1
Behavioral task
behavioral1
Sample
SOA.rar.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SOA.rar.exe
Resource
win10v2004-20220414-en
General
-
Target
SOA.rar.exe
-
Size
2.0MB
-
MD5
6e87a2e7ef62721a2aef357431076a7a
-
SHA1
1cdf35c6ea661a2ef0461d7b8de441eb8dd802b1
-
SHA256
5f409bddf5b4efe31ec833332774381385c1a31e3e2d8e5e3b2d2f934be0a5a7
-
SHA512
a752bb0fb663a27d4034478f3b4b63e005ce5b95a3db699b7918a59583e25182b50eca769994008bf6fc00ad9819daa91f476384c12e5511f8716da668f221dc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.parshavayealborz.com - Port:
587 - Username:
info@parshavayealborz.com - Password:
P@rshava123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4704-145-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
Processes:
MSBuild.exeMSBuild.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts MSBuild.exe File opened for modification C:\Windows\system32\drivers\etc\hosts MSBuild.exe -
Drops startup file 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ReAgentc.url RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CpSnJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CpSnJ\\CpSnJ.exe" MSBuild.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/224-140-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral2/memory/224-141-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral2/memory/224-142-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral2/memory/224-143-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
SOA.rar.exeRegSvcs.exeRegSvcs.exedescription pid process target process PID 2852 set thread context of 4328 2852 SOA.rar.exe RegSvcs.exe PID 4328 set thread context of 224 4328 RegSvcs.exe RegSvcs.exe PID 224 set thread context of 4704 224 RegSvcs.exe MSBuild.exe PID 224 set thread context of 4852 224 RegSvcs.exe MSBuild.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3464 4704 WerFault.exe MSBuild.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
RegSvcs.exeMSBuild.exeRegSvcs.exeMSBuild.exepid process 4328 RegSvcs.exe 4328 RegSvcs.exe 4328 RegSvcs.exe 4328 RegSvcs.exe 4328 RegSvcs.exe 4328 RegSvcs.exe 4704 MSBuild.exe 4704 MSBuild.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe 4852 MSBuild.exe 4852 MSBuild.exe 224 RegSvcs.exe 224 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RegSvcs.exeMSBuild.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 4328 RegSvcs.exe Token: SeDebugPrivilege 4704 MSBuild.exe Token: SeDebugPrivilege 4852 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
RegSvcs.exepid process 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
RegSvcs.exepid process 224 RegSvcs.exe 224 RegSvcs.exe 224 RegSvcs.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
SOA.rar.exeRegSvcs.exeRegSvcs.exeMSBuild.exeMSBuild.exedescription pid process target process PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 2852 wrote to memory of 4328 2852 SOA.rar.exe RegSvcs.exe PID 4328 wrote to memory of 3844 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 3844 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 3844 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 4368 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 4368 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 4368 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 1820 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 1820 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 1820 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 4328 wrote to memory of 224 4328 RegSvcs.exe RegSvcs.exe PID 224 wrote to memory of 4704 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4704 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4704 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4704 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4704 224 RegSvcs.exe MSBuild.exe PID 4704 wrote to memory of 3760 4704 MSBuild.exe REG.exe PID 4704 wrote to memory of 3760 4704 MSBuild.exe REG.exe PID 4704 wrote to memory of 3760 4704 MSBuild.exe REG.exe PID 224 wrote to memory of 4852 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4852 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4852 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4852 224 RegSvcs.exe MSBuild.exe PID 224 wrote to memory of 4852 224 RegSvcs.exe MSBuild.exe PID 4852 wrote to memory of 4844 4852 MSBuild.exe REG.exe PID 4852 wrote to memory of 4844 4852 MSBuild.exe REG.exe PID 4852 wrote to memory of 4844 4852 MSBuild.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.rar.exe"C:\Users\Admin\AppData\Local\Temp\SOA.rar.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"4⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 16205⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"4⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4704 -ip 47041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system32\drivers\etc\hostsFilesize
846B
MD55b2d17233558878a82ee464d04f58b59
SHA147ebffcad0b4c358df0d6a06ef335cb6aab0ab20
SHA2565b036588bb4cad3de01dd04988af705da135d9f394755080cf9941444c09a542
SHA512d2aec9779eb8803514213a8e396b2f7c0b4a6f57de1ee84e9db0343ee5ff093e26bb70e0737a6681e21e88898ef5139969ff0b4b700cb6727979bd898fdbc85b
-
memory/224-139-0x0000000000000000-mapping.dmp
-
memory/224-143-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/224-142-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/224-150-0x0000000004740000-0x00000000047D7000-memory.dmpFilesize
604KB
-
memory/224-141-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/224-140-0x0000000000400000-0x0000000000579000-memory.dmpFilesize
1.5MB
-
memory/224-151-0x0000000004880000-0x0000000004917000-memory.dmpFilesize
604KB
-
memory/1820-138-0x0000000000000000-mapping.dmp
-
memory/2852-133-0x00000000089A0000-0x0000000008F44000-memory.dmpFilesize
5.6MB
-
memory/2852-130-0x00000000004E0000-0x00000000006F2000-memory.dmpFilesize
2.1MB
-
memory/2852-132-0x0000000005150000-0x00000000051EC000-memory.dmpFilesize
624KB
-
memory/2852-131-0x00000000050B0000-0x0000000005142000-memory.dmpFilesize
584KB
-
memory/3760-153-0x0000000000000000-mapping.dmp
-
memory/3844-136-0x0000000000000000-mapping.dmp
-
memory/4328-135-0x0000000000400000-0x00000000005B2000-memory.dmpFilesize
1.7MB
-
memory/4328-134-0x0000000000000000-mapping.dmp
-
memory/4368-137-0x0000000000000000-mapping.dmp
-
memory/4704-145-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/4704-144-0x0000000000000000-mapping.dmp
-
memory/4704-152-0x0000000005F80000-0x0000000005FE6000-memory.dmpFilesize
408KB
-
memory/4704-154-0x0000000006B30000-0x0000000006B80000-memory.dmpFilesize
320KB
-
memory/4844-162-0x0000000000000000-mapping.dmp
-
memory/4852-155-0x0000000000000000-mapping.dmp