Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
YMi3ytThK61izUO.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
YMi3ytThK61izUO.exe
Resource
win10v2004-20241007-en
General
-
Target
YMi3ytThK61izUO.exe
-
Size
754KB
-
MD5
7dd423980df5f2b5c17842894c77d77d
-
SHA1
4f0edaae8ae93da4b05269aa78ca46401712e5a8
-
SHA256
f6e560ce19f29365583a29c5b5bc2128dcc0d8e1c021b54f79f6ecadd723e21d
-
SHA512
5cd7f7d8d92c7ff98eb6cca1e146856bd2b894c3f7c1932beb603b1dbde79f2d8f932931417868ce987ea2e8a2889bcfcf75be7c258b59009dc56d4e28998fbb
-
SSDEEP
12288:/+9bQ+X8+UiDLbRHahkURhh7t7nrp2rMTmN2KCK34yYPFKnDkQ+xXhV:IbQ+X8+UiDLbRHahkUfh7RrkrMTw2KCr
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.aishaautornation.com - Port:
587 - Username:
[email protected] - Password:
wOT@BBp9
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3164-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YMi3ytThK61izUO.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YMi3ytThK61izUO.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YMi3ytThK61izUO.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 3164 1668 YMi3ytThK61izUO.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMi3ytThK61izUO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMi3ytThK61izUO.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 1668 YMi3ytThK61izUO.exe 3164 YMi3ytThK61izUO.exe 3164 YMi3ytThK61izUO.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 YMi3ytThK61izUO.exe Token: SeDebugPrivilege 3164 YMi3ytThK61izUO.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1528 1668 YMi3ytThK61izUO.exe 100 PID 1668 wrote to memory of 1528 1668 YMi3ytThK61izUO.exe 100 PID 1668 wrote to memory of 1528 1668 YMi3ytThK61izUO.exe 100 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 PID 1668 wrote to memory of 3164 1668 YMi3ytThK61izUO.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YMi3ytThK61izUO.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YMi3ytThK61izUO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\YMi3ytThK61izUO.exe"C:\Users\Admin\AppData\Local\Temp\YMi3ytThK61izUO.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\YMi3ytThK61izUO.exe"C:\Users\Admin\AppData\Local\Temp\YMi3ytThK61izUO.exe"2⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\YMi3ytThK61izUO.exe"C:\Users\Admin\AppData\Local\Temp\YMi3ytThK61izUO.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3164
-