Analysis
-
max time kernel
133s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
aa587ebbf050bd4a1631fd2a3346232a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa587ebbf050bd4a1631fd2a3346232a.exe
Resource
win10v2004-20240226-en
General
-
Target
aa587ebbf050bd4a1631fd2a3346232a.exe
-
Size
694KB
-
MD5
aa587ebbf050bd4a1631fd2a3346232a
-
SHA1
f898720c9f7ebf199d8400ff4f0a78cdd2f5fc43
-
SHA256
7336a855a84f2f2d0f49c00a9ccdd993135369b15fa93fc429c31bdcdb002cf6
-
SHA512
2a2ae165605514b06169215104cea55659dc8ea6fb42a05bfd0bc050704ced3f275bf3b6bf4cce67af140d6fcf598cd007285d12d3e995b57b170a92c65b4a86
-
SSDEEP
12288:UA+G/T5voQGYWYmjd+Z4dC++FHxaIXGClNLi/e1MGDauKzm0PnqgquWVO:tx7WFYpyd+ZYCvFRauldMZdPnS1VO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.priserveinfra.com - Port:
587 - Username:
[email protected] - Password:
oppipl121019
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral2/memory/3272-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3272-15-0x00000000054C0000-0x00000000054D0000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts MSBuild.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NXLun = "C:\\Users\\Admin\\AppData\\Roaming\\NXLun\\NXLun.exe" MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2500 set thread context of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 3272 MSBuild.exe 3272 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 aa587ebbf050bd4a1631fd2a3346232a.exe Token: SeDebugPrivilege 3272 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 PID 2500 wrote to memory of 3272 2500 aa587ebbf050bd4a1631fd2a3346232a.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa587ebbf050bd4a1631fd2a3346232a.exe"C:\Users\Admin\AppData\Local\Temp\aa587ebbf050bd4a1631fd2a3346232a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3272
-