Analysis
-
max time kernel
70s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/06/2023, 15:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bill slip.exe
Resource
win7-20230220-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
bill slip.exe
Resource
win10v2004-20230221-en
4 signatures
150 seconds
General
-
Target
bill slip.exe
-
Size
775KB
-
MD5
b58f92af2dfcb2b3a68725af2bf950e3
-
SHA1
2a69c0a289d4f41d8ab2ed3b3ff9bb16e4cd2f6e
-
SHA256
169c4a3f668ce8d737dd54f1ab2a920badc42832968e7987eb660319eb938259
-
SHA512
c645108ee108f1cca6280b96d90cdeadc7cb11962fc2897c6d4708e37b4cb19411165f79693d0e2c9b76aed6264f97191601195208c392a7d098d7a65017770f
-
SSDEEP
24576:mqOufrq7x/7Tjd7Adn/HowKExFb0rb6usC+4qXdVJ:hFfCRlEVvowKELgZsC+4qXt
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.polorstar-th.com - Port:
587 - Username:
[email protected] - Password:
blessing12345 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 820 set thread context of 1288 820 bill slip.exe 27 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 820 bill slip.exe 820 bill slip.exe 1288 vbc.exe 1288 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 820 bill slip.exe Token: SeDebugPrivilege 1288 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 PID 820 wrote to memory of 1288 820 bill slip.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bill slip.exe"C:\Users\Admin\AppData\Local\Temp\bill slip.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1288
-