Analysis
-
max time kernel
91s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
321 Amita Technical 16.09.2022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
321 Amita Technical 16.09.2022.exe
Resource
win10v2004-20220812-en
General
-
Target
321 Amita Technical 16.09.2022.exe
-
Size
570KB
-
MD5
6e9e36c59bb2c22376176b2437c139dd
-
SHA1
b2118a3b1d43118f0654b38a666e8efeaaeb48d7
-
SHA256
aa479a4d4e6d714aaf177cbb6b7b5cd7f5e05f10bde29fd50c88308291869cc7
-
SHA512
4a147f407f88fc2fad5215edb5efecab474ba3865e50dd2d34ccb9e76afeb1dece3bbc5168fe2d616cc779fc7fdf8116674c2a2ac8bb99398c732f531b101877
-
SSDEEP
12288:WJ8mfqKtmO62/WJm71I1W6cYYl9v4QjFMsZNSs86:WSbKwOzc1W6cv7JjFMsZN26
Malware Config
Extracted
Protocol: smtp- Host:
multimetals.cfd - Port:
587 - Username:
[email protected] - Password:
[email protected]
Extracted
agenttesla
Protocol: smtp- Host:
multimetals.cfd - Port:
587 - Username:
application/x-www-form-urlencoded - Password:
[email protected] - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 321 Amita Technical 16.09.2022.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Word = "C:\\Users\\Admin\\AppData\\Roaming\\Word\\Word.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 232 set thread context of 1700 232 unless.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 640 321 Amita Technical 16.09.2022.exe 232 unless.exe 232 unless.exe 1700 InstallUtil.exe 1700 InstallUtil.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 640 321 Amita Technical 16.09.2022.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 640 321 Amita Technical 16.09.2022.exe Token: SeDebugPrivilege 232 unless.exe Token: SeDebugPrivilege 1700 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 640 wrote to memory of 232 640 321 Amita Technical 16.09.2022.exe 86 PID 640 wrote to memory of 232 640 321 Amita Technical 16.09.2022.exe 86 PID 640 wrote to memory of 232 640 321 Amita Technical 16.09.2022.exe 86 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 PID 232 wrote to memory of 1700 232 unless.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\321 Amita Technical 16.09.2022.exe"C:\Users\Admin\AppData\Local\Temp\321 Amita Technical 16.09.2022.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\unless.exe"C:\Users\Admin\AppData\Local\Temp\unless.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1700
-
-