Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 10:46
Static task
static1
Behavioral task
behavioral1
Sample
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
Resource
win10v2004-20220721-en
General
-
Target
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe
-
Size
5.2MB
-
MD5
f7389b83ba7eaedeae31eda31412db06
-
SHA1
ccfd2e456ccf2c8cc24942797805ad4d15a6d860
-
SHA256
ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
-
SHA512
ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
157.230.124.151 - Port:
587 - Username:
[email protected] - Password:
chichi001
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
NetWire RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1948-86-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1948-88-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1948-85-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1948-90-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1948-91-0x00000000004026D0-mapping.dmp netwire behavioral1/memory/1948-95-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1948-96-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1948-98-0x0000000000400000-0x000000000042B000-memory.dmp netwire -
AgentTesla payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1984-101-0x0000000000080000-0x00000000000CC000-memory.dmp family_agenttesla behavioral1/memory/1984-102-0x0000000000080000-0x00000000000CC000-memory.dmp family_agenttesla behavioral1/memory/1984-104-0x0000000000447E1E-mapping.dmp family_agenttesla behavioral1/memory/1984-107-0x0000000000080000-0x00000000000CC000-memory.dmp family_agenttesla behavioral1/memory/1984-106-0x0000000000080000-0x00000000000CC000-memory.dmp family_agenttesla behavioral1/memory/1984-111-0x0000000000080000-0x00000000000CC000-memory.dmp family_agenttesla behavioral1/memory/1984-114-0x0000000000080000-0x00000000000CC000-memory.dmp family_agenttesla -
Executes dropped EXE 5 IoCs
Processes:
orijan23.exellij.exeisud.exellij.exeisud.exepid process 1968 orijan23.exe 1372 llij.exe 1104 isud.exe 1948 llij.exe 1984 isud.exe -
Drops startup file 1 IoCs
Processes:
llij.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\llij.lnk llij.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.execmd.execmd.exellij.exepid process 2024 cmd.exe 1688 cmd.exe 468 cmd.exe 1372 llij.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
isud.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\isjk = "C:\\Users\\Admin\\AppData\\Roaming\\isud.exe" isud.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
llij.exeisud.exedescription pid process target process PID 1372 set thread context of 1948 1372 llij.exe llij.exe PID 1104 set thread context of 1984 1104 isud.exe isud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exeorijan23.exellij.exeisud.exedescription pid process Token: SeDebugPrivilege 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe Token: SeDebugPrivilege 1968 orijan23.exe Token: SeDebugPrivilege 1372 llij.exe Token: SeDebugPrivilege 1104 isud.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.execmd.execmd.exeorijan23.execmd.exellij.exeisud.exedescription pid process target process PID 912 wrote to memory of 2024 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 2024 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 2024 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 2024 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 2024 wrote to memory of 1968 2024 cmd.exe orijan23.exe PID 2024 wrote to memory of 1968 2024 cmd.exe orijan23.exe PID 2024 wrote to memory of 1968 2024 cmd.exe orijan23.exe PID 2024 wrote to memory of 1968 2024 cmd.exe orijan23.exe PID 912 wrote to memory of 1260 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1260 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1260 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1260 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1688 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1688 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1688 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 912 wrote to memory of 1688 912 FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe cmd.exe PID 1688 wrote to memory of 1372 1688 cmd.exe llij.exe PID 1688 wrote to memory of 1372 1688 cmd.exe llij.exe PID 1688 wrote to memory of 1372 1688 cmd.exe llij.exe PID 1688 wrote to memory of 1372 1688 cmd.exe llij.exe PID 1968 wrote to memory of 1008 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 1008 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 1008 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 1008 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 468 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 468 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 468 1968 orijan23.exe cmd.exe PID 1968 wrote to memory of 468 1968 orijan23.exe cmd.exe PID 468 wrote to memory of 1104 468 cmd.exe isud.exe PID 468 wrote to memory of 1104 468 cmd.exe isud.exe PID 468 wrote to memory of 1104 468 cmd.exe isud.exe PID 468 wrote to memory of 1104 468 cmd.exe isud.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1372 wrote to memory of 1948 1372 llij.exe llij.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe PID 1104 wrote to memory of 1984 1104 isud.exe isud.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe"C:\Users\Admin\AppData\Local\Temp\FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\orijan23.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\orijan23.exe"C:\Users\Admin\AppData\Roaming\orijan23.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\orijan23.exe" "C:\Users\Admin\AppData\Roaming\isud.exe"4⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\isud.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\isud.exe"C:\Users\Admin\AppData\Roaming\isud.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Roaming\isud.exe"C:\Users\Admin\AppData\Roaming\isud.exe"6⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\FFD551A66208B73CEE933FC4E27C449B8EABB0ACB0FE2.exe" "C:\Users\Admin\AppData\Roaming\llij.exe"2⤵PID:1260
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\llij.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\llij.exe"C:\Users\Admin\AppData\Roaming\llij.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Roaming\llij.exe"C:\Users\Admin\AppData\Roaming\llij.exe"4⤵
- Executes dropped EXE
PID:1948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365
-
Filesize
5.2MB
MD5f7389b83ba7eaedeae31eda31412db06
SHA1ccfd2e456ccf2c8cc24942797805ad4d15a6d860
SHA256ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
SHA512ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
-
Filesize
5.2MB
MD5f7389b83ba7eaedeae31eda31412db06
SHA1ccfd2e456ccf2c8cc24942797805ad4d15a6d860
SHA256ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
SHA512ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
-
Filesize
5.2MB
MD5f7389b83ba7eaedeae31eda31412db06
SHA1ccfd2e456ccf2c8cc24942797805ad4d15a6d860
SHA256ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
SHA512ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365
-
Filesize
32B
MD5b41566341029c6b54305e634392aeb15
SHA176f3e3c6c7814fff265710b93af1e2109d6ec6f9
SHA2569c797e062cd7946612fdf00b4368ba1b2ba1ca1996cb7b1e0e7c6918f85e4a17
SHA5126fd4541d89eec59e382e03a2d5b3228a020ba6d3245756010070ebf3b1f6c7a28586dc1bee11b0cfc8610c807b2a69e748f67f2458c6d5f6c0a584634c629a53
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365
-
Filesize
5.2MB
MD5f7389b83ba7eaedeae31eda31412db06
SHA1ccfd2e456ccf2c8cc24942797805ad4d15a6d860
SHA256ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
SHA512ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
-
Filesize
5.2MB
MD5f7389b83ba7eaedeae31eda31412db06
SHA1ccfd2e456ccf2c8cc24942797805ad4d15a6d860
SHA256ffd551a66208b73cee933fc4e27c449b8eabb0acb0fe27ad251844e2fb8821d1
SHA512ac7f8ef5e4736e6fcb0f54c88761095dbcb09cec44d35b1efcfb7cbc03341049fc55410ad49925399ea8e56ea02d5c1ad1c20fb4c344d3027fbb7873f45aa4a9
-
Filesize
1.3MB
MD52d5da0b865fc3e5800402a0c2fb63920
SHA114625c0835dcd3a904372a0e805e39303a4d9ecb
SHA256ec0e9584d2523f23746d30005c2fd08a2ee70311d169792447c6c09f02614b81
SHA512efff3d9adcea59bddc772af7d5372853de4e92e232e7380d813d3d0f8f70c60729e5853424b79e64e5aea288dfe4b1eaa49adc78d829352f0a4ea8a371451365