Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe
Resource
win10v2004-20231222-en
General
-
Target
b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe
-
Size
1.9MB
-
MD5
61067fc22c6628fe351a76f6ec19b6da
-
SHA1
b1be7c51c75a5ddf4864f36bddd2cbb32ea6659c
-
SHA256
b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8
-
SHA512
9891db373116baad04cbca1ef266f8e46ced5633f1eeb351c0517ea250d4d67925696481ee8602a9e8a77b5e30aa0939882e2c63e54688aba0c7713f06dd525a
-
SSDEEP
49152:ah+ZkldoPKi2aNH5Bod+FNNnxv93Y6OqRkLDjH4ly:z2cPKiHB7NNn33YnV3Y
Malware Config
Extracted
Protocol: smtp- Host:
send.one.com - Port:
587 - Username:
[email protected] - Password:
Ijg2qXIq7^.u
Extracted
agenttesla
Protocol: smtp- Host:
send.one.com - Port:
587 - Username:
[email protected] - Password:
Ijg2qXIq7^.u
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1556-5-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\netbtugc.url b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UoOfbM = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UoOfbM\\UoOfbM.exe" RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 628 set thread context of 1556 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 1556 RegAsm.exe 1556 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1556 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 RegAsm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 628 wrote to memory of 1556 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 83 PID 628 wrote to memory of 1556 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 83 PID 628 wrote to memory of 1556 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 83 PID 628 wrote to memory of 1556 628 b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe 83 PID 1556 wrote to memory of 1764 1556 RegAsm.exe 91 PID 1556 wrote to memory of 1764 1556 RegAsm.exe 91 PID 1556 wrote to memory of 1764 1556 RegAsm.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe"C:\Users\Admin\AppData\Local\Temp\b764867253a7800f4b0a1ee1fbce93dc54e2e60a23b14b0ae1562af2042c53b8.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1556 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1764
-
-