Analysis
-
max time kernel
82s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/09/2022, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
b84PVuQIuQD2g8C.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b84PVuQIuQD2g8C.exe
Resource
win10v2004-20220812-en
General
-
Target
b84PVuQIuQD2g8C.exe
-
Size
746KB
-
MD5
64011a7871abb873c822b8b99082e8ab
-
SHA1
3d463299cda11670351fb5b2c1e0c213bf7563ef
-
SHA256
a442b02412d266580b4e2bc5a4c4d548a16b5035c345e62f32f6094846e1557f
-
SHA512
277f1c221a50bd47b7043a2a80e753820fe50818f0bbd06ae5ea6cf45f12df3da3c91cb9134fe52563ad54df3b7b5d65fb965a224fb3203acac7bee4b93a38ce
-
SSDEEP
12288:7BxGcU5f3AFiAV/NpeCYdUtwd0ITYlo0L8nbezhEBn4DauUkoPO9R4kb:mcU5f3A0CUnddR0lEbYi4DJRoPOX4k
Malware Config
Extracted
Protocol: smtp- Host:
mail.essentialapparatus.co.ke - Port:
587 - Username:
[email protected] - Password:
Info@2018
Extracted
agenttesla
Protocol: smtp- Host:
mail.essentialapparatus.co.ke - Port:
587 - Username:
[email protected] - Password:
Info@2018 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b84PVuQIuQD2g8C.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 b84PVuQIuQD2g8C.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 b84PVuQIuQD2g8C.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 b84PVuQIuQD2g8C.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tnpak = "C:\\Users\\Admin\\AppData\\Roaming\\Tnpak\\Tnpak.exe" b84PVuQIuQD2g8C.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 360 set thread context of 1740 360 b84PVuQIuQD2g8C.exe 27 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 360 b84PVuQIuQD2g8C.exe 360 b84PVuQIuQD2g8C.exe 1740 b84PVuQIuQD2g8C.exe 1740 b84PVuQIuQD2g8C.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 360 b84PVuQIuQD2g8C.exe Token: SeDebugPrivilege 1740 b84PVuQIuQD2g8C.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 PID 360 wrote to memory of 1740 360 b84PVuQIuQD2g8C.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 b84PVuQIuQD2g8C.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 b84PVuQIuQD2g8C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b84PVuQIuQD2g8C.exe"C:\Users\Admin\AppData\Local\Temp\b84PVuQIuQD2g8C.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\b84PVuQIuQD2g8C.exe"C:\Users\Admin\AppData\Local\Temp\b84PVuQIuQD2g8C.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1740
-