Analysis
-
max time kernel
72s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/09/2022, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe
-
Size
134KB
-
MD5
fa642af59bc3f678e8c64942de1ea1b5
-
SHA1
cb5a9a2b97969938efffe74a2961936853239a04
-
SHA256
698dee67ffc5a82e25e75e3adb337b0d4869d2c2f5ff1362c4b8ef881ac84f54
-
SHA512
c03a62db947abe6f2994df3c54b6e6322dd07a9e4c843b8821495579f51deec5ad038fae580d2733da0350e691111f6ad07f875a91c85216566a126c4ef715e1
-
SSDEEP
3072:tNRCywDw1DiJkupabH2rCcSla0qN/vwfFfdLQ861CxBbFhnQ7Cx:tT4DtyWrCjlSSB61CxQ
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.overviewsupplies.com/ - Port:
21 - Username:
[email protected] - Password:
w[3c2r?B,Of+
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe caspol.exe -
Loads dropped DLL 1 IoCs
pid Process 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1136 caspol.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 1136 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 1136 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 27 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Aestus.ini SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1136 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 27 PID 1836 wrote to memory of 1136 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 27 PID 1836 wrote to memory of 1136 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 27 PID 1836 wrote to memory of 1136 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 27 PID 1836 wrote to memory of 1136 1836 SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe 27 PID 1136 wrote to memory of 2000 1136 caspol.exe 31 PID 1136 wrote to memory of 2000 1136 caspol.exe 31 PID 1136 wrote to memory of 2000 1136 caspol.exe 31 PID 1136 wrote to memory of 2000 1136 caspol.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Nemesis.8199.18591.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15883⤵PID:2000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5a1da6788aeaf78ca4ae1dece8019e49d
SHA1d770155e6e9aa69223be198c44a8da26a1756d89
SHA256b7823a15e7b1866ba3d77248f750b66505859d264cfc39d8c8c5e812f8ae4a81
SHA512eada9c1528563ddfe3d4d8ed5dbc52b85a9190765535b68da90e6d623288bf0090adac5118e1ed6e3cb3e0abb9af025d3a2a73121413a4471a90fd04bc861e18