Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 18:37
Static task
static1
Behavioral task
behavioral1
Sample
6485c53b3856bc435502490d0337c2bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6485c53b3856bc435502490d0337c2bb.exe
Resource
win10v2004-20221111-en
General
-
Target
6485c53b3856bc435502490d0337c2bb.exe
-
Size
1.4MB
-
MD5
6485c53b3856bc435502490d0337c2bb
-
SHA1
eb9369983e8b4579f9219e2882b955d36f55a653
-
SHA256
1ecb491558de8c62b18aaa99230be6620a9ebe3fb7f3ea938a82fa05bcf110f9
-
SHA512
1306c2dd664c8d729df43c587201d083f6ada6c2d3c56e35187129ec64fad5230e5338ee674515794faabba240c8f143d4974bd0962254552c72b782d77fb1d1
-
SSDEEP
12288:ddOw3d/KnMP2hWiv4L2jH9nlSNfUu4OJetOSNK:DT3RKnMPqbgLs6fgcSNK
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server196.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
lagos@123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
InstallUtil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RMBJLaF = "C:\\Users\\Admin\\AppData\\Roaming\\RMBJLaF\\RMBJLaF.exe" InstallUtil.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 89 api.ipify.org 90 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6485c53b3856bc435502490d0337c2bb.exedescription pid process target process PID 2492 set thread context of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
6485c53b3856bc435502490d0337c2bb.exeInstallUtil.exepid process 2492 6485c53b3856bc435502490d0337c2bb.exe 2492 6485c53b3856bc435502490d0337c2bb.exe 2492 6485c53b3856bc435502490d0337c2bb.exe 2492 6485c53b3856bc435502490d0337c2bb.exe 3136 InstallUtil.exe 3136 InstallUtil.exe 3136 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
6485c53b3856bc435502490d0337c2bb.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2492 6485c53b3856bc435502490d0337c2bb.exe Token: SeDebugPrivilege 3136 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
6485c53b3856bc435502490d0337c2bb.exedescription pid process target process PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 4424 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe PID 2492 wrote to memory of 3136 2492 6485c53b3856bc435502490d0337c2bb.exe InstallUtil.exe -
outlook_office_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
Processes:
InstallUtil.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6485c53b3856bc435502490d0337c2bb.exe"C:\Users\Admin\AppData\Local\Temp\6485c53b3856bc435502490d0337c2bb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:4424
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3136