Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
07094399.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
07094399.exe
Resource
win10v2004-20230220-en
General
-
Target
07094399.exe
-
Size
1.0MB
-
MD5
926f1921a1c2823926681f21eaef2679
-
SHA1
3685206ef80828371bb5ffeef5dc35351194eafa
-
SHA256
b3ca0b93eff9f2f129fe069e2b7dc734f749db4d098a9be27e28e36519b3fb70
-
SHA512
99481ca51392ece39a12e9d3d536afedcc27473ccd6e33e2ceac56129f33b5eec0159d6d618bdf29ea5967797a537bdd8a2f8d08ae33808a92f3382176f0794d
-
SSDEEP
12288:RINiEP/SJaieyY3Pdy7KVwG8Q+VrYLz4ge47WZ4ackzDOFU8s8ROI9HzuL56rcGF:RIB/4Kfdy70h8L8LzDe4Wf8I8R1EqTJ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.methobsindia.com - Port:
587 - Username:
[email protected] - Password:
blessing2023 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 07094399.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 07094399.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 07094399.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4388 set thread context of 4784 4388 07094399.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4388 07094399.exe 4388 07094399.exe 4784 07094399.exe 4784 07094399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 07094399.exe Token: SeDebugPrivilege 4784 07094399.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3960 4388 07094399.exe 84 PID 4388 wrote to memory of 3960 4388 07094399.exe 84 PID 4388 wrote to memory of 3960 4388 07094399.exe 84 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 PID 4388 wrote to memory of 4784 4388 07094399.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 07094399.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 07094399.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07094399.exe"C:\Users\Admin\AppData\Local\Temp\07094399.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\07094399.exe"C:\Users\Admin\AppData\Local\Temp\07094399.exe"2⤵PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\07094399.exe"C:\Users\Admin\AppData\Local\Temp\07094399.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4784
-