Analysis
-
max time kernel
67s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe
-
Size
858KB
-
MD5
60c2ecb44642d9e51cd4b17b82358cb8
-
SHA1
8915a7b1bc4e9a0795877f1a1063dc9cdfb00f9e
-
SHA256
559e053e4acfbcb073e2f2614d733a4ef73f778147a2c58f881a46a8bd3a88f8
-
SHA512
cc0e3229b870faf6c25af7bebf545dbddebe2669db9eaefc74adb3569d041d54ff531cf903c721e8653de200bbbcc924b701c215fb2ae78b9a136d390d7c4b56
-
SSDEEP
24576:TIxSFvbutP/Sj6JPlNLa6qvekLoKVA43tEY0gRqs:s6j6JPllaFveCo4A43tZlc
Malware Config
Extracted
Protocol: smtp- Host:
smtp.leonardfood.com - Port:
587 - Username:
[email protected] - Password:
K@rimi95
Extracted
agenttesla
Protocol: smtp- Host:
smtp.leonardfood.com - Port:
587 - Username:
[email protected] - Password:
K@rimi95 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Regsvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Regsvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Regsvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Regsvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exedescription pid process target process PID 1784 set thread context of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Regsvcs.exepid process 2000 Regsvcs.exe 2000 Regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Regsvcs.exedescription pid process Token: SeDebugPrivilege 2000 Regsvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Regsvcs.exepid process 2000 Regsvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exedescription pid process target process PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe PID 1784 wrote to memory of 2000 1784 SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe Regsvcs.exe -
outlook_office_path 1 IoCs
Processes:
Regsvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Regsvcs.exe -
outlook_win_path 1 IoCs
Processes:
Regsvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Regsvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.21610.20158.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2000
-