Analysis
-
max time kernel
125s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
information.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
information.exe
Resource
win10v2004-20220812-en
General
-
Target
information.exe
-
Size
1.1MB
-
MD5
b3f2deb005bc80453da9d819482b11ca
-
SHA1
f6c2437095ed367c805a40d7018e4ee26b85b91a
-
SHA256
acc9bb38581081506db62caf5850f4b8819296a1be01202b47c44d3950e7ebb2
-
SHA512
f8a3aecf4e25854817c4a230743e29a55a7f8cc2fb8468de2c20ec8e8f344cc996d1ffaa51b1968c7a8f9ffff21687285fd931e6184f05b34040580a53ec7612
-
SSDEEP
24576:yDIm+CwxbNuTrG2muk2P6BRQfpmYeWPd+:yDIpCwx5+GGyfUpbPQ
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral1/memory/1712-72-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1712-73-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1712-74-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1712-75-0x000000000043787E-mapping.dmp family_agenttesla behavioral1/memory/1712-77-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1712-79-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 576 set thread context of 1712 576 information.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 576 information.exe 576 information.exe 576 information.exe 576 information.exe 576 information.exe 576 information.exe 1712 information.exe 1712 information.exe 1464 powershell.exe 1516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 576 information.exe Token: SeDebugPrivilege 1712 information.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeDebugPrivilege 1516 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 576 information.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 576 information.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 576 wrote to memory of 1516 576 information.exe 26 PID 576 wrote to memory of 1516 576 information.exe 26 PID 576 wrote to memory of 1516 576 information.exe 26 PID 576 wrote to memory of 1516 576 information.exe 26 PID 576 wrote to memory of 1464 576 information.exe 28 PID 576 wrote to memory of 1464 576 information.exe 28 PID 576 wrote to memory of 1464 576 information.exe 28 PID 576 wrote to memory of 1464 576 information.exe 28 PID 576 wrote to memory of 1104 576 information.exe 30 PID 576 wrote to memory of 1104 576 information.exe 30 PID 576 wrote to memory of 1104 576 information.exe 30 PID 576 wrote to memory of 1104 576 information.exe 30 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32 PID 576 wrote to memory of 1712 576 information.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\information.exe"C:\Users\Admin\AppData\Local\Temp\information.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\information.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wSYotnpd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wSYotnpd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF75.tmp"2⤵
- Creates scheduled task(s)
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\information.exe"C:\Users\Admin\AppData\Local\Temp\information.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58fad46343e428e3e6cc0e6e53c5db1db
SHA1e4b2771f6d01d5a700ff59ca84c1ee34e4551767
SHA256cb53f089d5c2cab3a83e0584305f719004c6d9e4961a2b861d25c6fa5ffb8c2d
SHA512fb34596253b7cc81fa0ba023a6e9773eccd6e1094bcbd1ec1cffe8f9f7ea6f81105329670531112d62a2a3bf312721479c6b0cc3fa4cb1a3c3ba65ece6cfc699
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cfbe7b3e01ef51efb52548099e80d16e
SHA1c945a1dad50ed18bed90339fc199f93c542ee6aa
SHA2567a3fce8db636b51a15cef156cef99fcb65a278f9331eac8e1048428cae3de327
SHA512402a3870d594821d2e06a21311d6135f8127525f5a23b1fec45a493ca5dde6383eae5bc95fba8769b8013f1d34b0c7de757b5c616cef160389909ca4131f9c35