Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Dhl recent package delivery report needs attention.exe

Overview

General Information

Sample Name:Dhl recent package delivery report needs attention.exe
Analysis ID:626595
MD5:163d3bc2c523dc10c959474aa3f69d56
SHA1:5338e0aaea69b582d22ff624b4a9fd4efc9eb707
SHA256:1040411f26f6464fb485e92e74c08c559a6feb9bed0eadc44e831a08c80e8a01
Tags:AgentTeslaDHLexeTelegram
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Creates processes with suspicious names
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Dhl recent package delivery report needs attention.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe" MD5: 163D3BC2C523DC10C959474AA3F69D56)
    • vbc.exe (PID: 2728 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1436982177", "Chat URL": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            2.0.vbc.exe.610000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.0.vbc.exe.610000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.0.vbc.exe.610000.3.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  2.0.vbc.exe.610000.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x32c56:$s10: logins
                  • 0x326bd:$s11: credential
                  • 0x2ec03:$g1: get_Clipboard
                  • 0x2ec11:$g2: get_Keyboard
                  • 0x2ec1e:$g3: get_Password
                  • 0x2ff1b:$g4: get_CtrlKeyDown
                  • 0x2ff2b:$g5: get_ShiftKeyDown
                  • 0x2ff3c:$g6: get_AltKeyDown
                  2.2.vbc.exe.610000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 33 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1436982177", "Chat URL": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument"}
                    Source: vbc.exe.2728.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendMessage"}
                    Source: Dhl recent package delivery report needs attention.exeReversingLabs: Detection: 36%
                    Source: Dhl recent package delivery report needs attention.exeJoe Sandbox ML: detected
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49770 version: TLS 1.2
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    bar