Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 16:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
PAYMENT SLIP.exe
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
PAYMENT SLIP.exe
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
PAYMENT SLIP.exe
-
Size
690KB
-
MD5
10c038fed5281fbbbc727a74336e2f0a
-
SHA1
8a210c8f48426cf1d8d18e5a267b680c4bfd256b
-
SHA256
abef18ea3dd420650a3c4ffbae70c8a3409788f67986c0bb08955a85b6b3a290
-
SHA512
7f9a71f8e4f77d744d45dc7a8cfc203b761e09ad82b62bc0e94697fbc95c1d97e0f63fbbd123a5787c140dcc9f33e2d7462f8226f4c0a2df6a56384063c9f61b
-
SSDEEP
12288:F3CDNxgGmZmBlwzyeJHi8FT0Yrc72104IEiAgn:QNq8lwG8Hi8dB910TfBn
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
sarahfoils.com - Port:
587 - Username:
[email protected] - Password:
Scalatica01 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1500 set thread context of 2656 1500 PAYMENT SLIP.exe 90 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 PID 1500 wrote to memory of 2656 1500 PAYMENT SLIP.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT SLIP.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT SLIP.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2656
-