Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 00:43
Static task
static1
Behavioral task
behavioral1
Sample
473abc32162018e106a776dc9acceac0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
473abc32162018e106a776dc9acceac0.exe
Resource
win10v2004-20231215-en
General
-
Target
473abc32162018e106a776dc9acceac0.exe
-
Size
840KB
-
MD5
473abc32162018e106a776dc9acceac0
-
SHA1
5152df8dbcec444f42ed278bc57fe47cfdb735b7
-
SHA256
e64c0a4f990a69ed7b395ed86eb27f0334bc48a4cae437db54f3e7625392eaa9
-
SHA512
e97e2acfbb92ae3f6966873dec23a02a483442177c2447d3f58a64e1af21e974999174a4d39b73313f86e1ea8d5af3f00dd466d00c42aa37f9e6c1e89558fd24
-
SSDEEP
24576:YomEX4uYup9Ds//8o2HRwmHqvjR2ZwX7mo5oFCEkv:xmVME/b2xwmHmhosv
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.buynsell.com.pk - Port:
587 - Username:
[email protected] - Password:
Zeco@141
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral1/memory/2040-16-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2040-21-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2040-24-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2040-26-0x0000000004890000-0x00000000048D0000-memory.dmp family_agenttesla behavioral1/memory/2040-19-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2040-15-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2164-3-0x00000000002F0000-0x0000000000302000-memory.dmp CustAttr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 473abc32162018e106a776dc9acceac0.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 473abc32162018e106a776dc9acceac0.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 473abc32162018e106a776dc9acceac0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\NewApp = "C:\\Users\\Admin\\AppData\\Roaming\\NewApp\\NewApp.exe" 473abc32162018e106a776dc9acceac0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 473abc32162018e106a776dc9acceac0.exe 2040 473abc32162018e106a776dc9acceac0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2040 473abc32162018e106a776dc9acceac0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2040 473abc32162018e106a776dc9acceac0.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2636 2164 473abc32162018e106a776dc9acceac0.exe 30 PID 2164 wrote to memory of 2636 2164 473abc32162018e106a776dc9acceac0.exe 30 PID 2164 wrote to memory of 2636 2164 473abc32162018e106a776dc9acceac0.exe 30 PID 2164 wrote to memory of 2636 2164 473abc32162018e106a776dc9acceac0.exe 30 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 PID 2164 wrote to memory of 2040 2164 473abc32162018e106a776dc9acceac0.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 473abc32162018e106a776dc9acceac0.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 473abc32162018e106a776dc9acceac0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\473abc32162018e106a776dc9acceac0.exe"C:\Users\Admin\AppData\Local\Temp\473abc32162018e106a776dc9acceac0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qZYHnCgwdh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2636.tmp"2⤵
- Creates scheduled task(s)
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\473abc32162018e106a776dc9acceac0.exe"C:\Users\Admin\AppData\Local\Temp\473abc32162018e106a776dc9acceac0.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD58d616f75c54559119143b344f0f53e9e
SHA1879b2ff81d46f31cd7da6d6a05b103ae73d5470f
SHA2566053f635591f7e60508a5b57bd3e453f90e4eef26db86aded35956bf7f57f7c1
SHA5128d79491ed56a216582afb5ff79c62f66f62edad5f0765ca3ddde8f3220887c75a5d38481c38264febbddc7e663692505ce9aaf11e8940cb80867a829d006b7fa