Analysis
-
max time kernel
73s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 08:32
Static task
static1
Behavioral task
behavioral1
Sample
marv.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
marv.exe
Resource
win10v2004-20230220-en
General
-
Target
marv.exe
-
Size
1017KB
-
MD5
e91fe201c90f67db8fb79ae57f649b67
-
SHA1
366acf2cb64c788fd2edb2d6a29f7e89a5980bcf
-
SHA256
e40944806883dfb2d3d00dc0b5f1285e83dd6fdd4c4023117c519c77cc1e3de4
-
SHA512
80548be10951a896e7317a792b92826f7e8b348c90868520bcf0001086d2ae2090af8583c7feb005411e0316a1d186d28e26d5058901610e3acffbc5f1e482c5
-
SSDEEP
24576:EC12zVZ97CF9v0bpGGU+wjY1NHXnNxC3opk:ECAR37c980GAkLK4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cabletraychina.com - Port:
587 - Username:
[email protected] - Password:
Iseeyou.com - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
marv.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 marv.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 marv.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 marv.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
marv.exedescription pid process target process PID 1704 set thread context of 1628 1704 marv.exe marv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
marv.exedescription pid process Token: SeDebugPrivilege 1628 marv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
marv.exedescription pid process target process PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe PID 1704 wrote to memory of 1628 1704 marv.exe marv.exe -
outlook_office_path 1 IoCs
Processes:
marv.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 marv.exe -
outlook_win_path 1 IoCs
Processes:
marv.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 marv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\marv.exe"C:\Users\Admin\AppData\Local\Temp\marv.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\marv.exe"C:\Users\Admin\AppData\Local\Temp\marv.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1628
-