Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOC.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SHIPPING DOC.exe
Resource
win10v2004-20220901-en
General
-
Target
SHIPPING DOC.exe
-
Size
478KB
-
MD5
d1c1aac83a4eb44e1f5a150b1f9ea01a
-
SHA1
54972afe738a2255c2f319b3077a6413a812809b
-
SHA256
50c5c887aece86fb6b2dd1184c183c87082ae8a126d52a7e735449f6be8fb68c
-
SHA512
19cb24c312e122fb876246b96d76f114c9115441faf139f9b465000948349b8c547c56e973a2aa9c154e0308700adcf51c593543d58a48e28bba5a111eebae38
-
SSDEEP
6144:0iE2fjXwDnSBb/66RUEdKborY4A3O92KBXRr+tdP1ueDkkaDSL3J3iwjIzL2Ga+c:0asDSpJ6yKb0Y4ZvOQoVL3FjM9sEV
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
CasPol.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SHIPPING DOC.exedescription pid process target process PID 960 set thread context of 1868 960 SHIPPING DOC.exe CasPol.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
CasPol.exepid process 1868 CasPol.exe 1868 CasPol.exe 1868 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CasPol.exedescription pid process Token: SeDebugPrivilege 1868 CasPol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SHIPPING DOC.exedescription pid process target process PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe PID 960 wrote to memory of 1868 960 SHIPPING DOC.exe CasPol.exe -
outlook_office_path 1 IoCs
Processes:
CasPol.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe -
outlook_win_path 1 IoCs
Processes:
CasPol.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1868
-