Analysis
-
max time kernel
146s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 05:38
Static task
static1
Behavioral task
behavioral1
Sample
8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe
Resource
win10v2004-20220414-en
General
-
Target
8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe
-
Size
338KB
-
MD5
02f3bc80226b4f83fc1834b48006f8f2
-
SHA1
0eb16d508e605a89a66891b3123972dcd06197d8
-
SHA256
8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43
-
SHA512
f8bd2bbb1cccdea74eed30d661f66512d0467ba22aef776099ff05ef18b2701cf69a41d550aa04fbe1c824a533b34f27d0ba1333e210620a9429d2c60b5aef38
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
908070bl
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
AgentTesla Payload 1 IoCs
resource yara_rule behavioral1/memory/1432-54-0x0000000000D80000-0x0000000000DDA000-memory.dmp family_agenttesla -
Disables Task Manager via registry modification
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windowsupdate = "C:\\Users\\Admin\\AppData\\Roaming\\Windowsupdate\\Windowsupdate.exe" 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.amazonaws.com 5 checkip.amazonaws.com -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1384 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1384 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe 29 PID 1432 wrote to memory of 1384 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe 29 PID 1432 wrote to memory of 1384 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe 29 PID 1432 wrote to memory of 1384 1432 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe"C:\Users\Admin\AppData\Local\Temp\8d48ebb0fa647bebb42025288e3a64a6e15114fa4bb9b47ed52c9d3bbf722d43.exe"1⤵
- UAC bypass
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
- outlook_office_path
- outlook_win_path
PID:1432 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:1384
-