Analysis
-
max time kernel
118s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/09/2022, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
Bank Details (2).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Bank Details (2).exe
Resource
win10v2004-20220901-en
General
-
Target
Bank Details (2).exe
-
Size
886KB
-
MD5
365b0f736819245a361685067d085973
-
SHA1
5ebc84d6fee374a581b8be86f4a810cfb0fb78e6
-
SHA256
cd5fb581a52c0030ee7cb86e500fb6ba669ee4a1266522e70cabf8c02320f948
-
SHA512
b68047445304c42b24c17f84dd603e7f6b1decd253099e888d18705be7f09bd59d0f70a5ad2885e6ce348a52bc4afe876530620eedb3664081bf70bd751324d1
-
SSDEEP
12288:2tlylSx18ydcFYcNlmrzeynK0eF4PfXLbNRPgPPUADqjJ5nSZhj41jCHj5b5oaPN:E8AArEzJaiPfXlhoP+jrSx
Malware Config
Extracted
Protocol: smtp- Host:
mail.hussain-co.com - Port:
587 - Username:
[email protected] - Password:
%%finance_@2018%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Details (2).exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Details (2).exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Details (2).exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 1184 1672 Bank Details (2).exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1672 Bank Details (2).exe 1672 Bank Details (2).exe 1184 Bank Details (2).exe 1184 Bank Details (2).exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1672 Bank Details (2).exe Token: SeDebugPrivilege 1184 Bank Details (2).exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1100 1672 Bank Details (2).exe 27 PID 1672 wrote to memory of 1100 1672 Bank Details (2).exe 27 PID 1672 wrote to memory of 1100 1672 Bank Details (2).exe 27 PID 1672 wrote to memory of 1100 1672 Bank Details (2).exe 27 PID 1672 wrote to memory of 864 1672 Bank Details (2).exe 29 PID 1672 wrote to memory of 864 1672 Bank Details (2).exe 29 PID 1672 wrote to memory of 864 1672 Bank Details (2).exe 29 PID 1672 wrote to memory of 864 1672 Bank Details (2).exe 29 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 PID 1672 wrote to memory of 1184 1672 Bank Details (2).exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Details (2).exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bank Details (2).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bank Details (2).exe"C:\Users\Admin\AppData\Local\Temp\Bank Details (2).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xQGeDZGiUF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp88EF.tmp"2⤵
- Creates scheduled task(s)
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\Bank Details (2).exe"{path}"2⤵PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\Bank Details (2).exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5af33cd0629aeedd8fec52062a0302514
SHA1a3cc2cef918ab1b9508a18f03b2c7e5b3d244343
SHA256df0fa05b1f0044cceba678341dd9b9cb807ef035d2bce882fd00b4cd2b9d60bb
SHA5126627b7affbe7c61407355829e395b24e9e9b2aa15eb7df7432c0e65c22b1a79b6b4872b59865548764304cecef0e8ad376e1c2341b2be8f7dedca8ef8458ed56