Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 17:54
Static task
static1
Behavioral task
behavioral1
Sample
E-DEKONT.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
E-DEKONT.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
E-DEKONT.exe
-
Size
317KB
-
MD5
dc7db0e231db40b8863328dfb87cfca0
-
SHA1
efeed520e01ec8dcb0bdb9f966dc0734f92a1110
-
SHA256
d4b61ea46e33b1a7223439e6e31106e92caaf96370ec9e0a53771d4ab121abdd
-
SHA512
8231ade196b6e65c297d584260c2dc7c41f5a759e0bd3c23c486b002b2719f93afe379e109147718750e07ec25827cd2d31138789b89dfea9091880c96f43408
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1804-21-0x0000000000400000-0x000000000044D000-memory.dmp family_agenttesla -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
E-DEKONT.exeE-DEKONT.exeE-DEKONT.exeE-DEKONT.exeE-DEKONT.exeE-DEKONT.exeE-DEKONT.exeE-DEKONT.exeE-DEKONT.exedescription pid process target process PID 800 wrote to memory of 2028 800 E-DEKONT.exe E-DEKONT.exe PID 800 wrote to memory of 2028 800 E-DEKONT.exe E-DEKONT.exe PID 800 wrote to memory of 2028 800 E-DEKONT.exe E-DEKONT.exe PID 800 wrote to memory of 2028 800 E-DEKONT.exe E-DEKONT.exe PID 2028 wrote to memory of 1176 2028 E-DEKONT.exe E-DEKONT.exe PID 2028 wrote to memory of 1176 2028 E-DEKONT.exe E-DEKONT.exe PID 2028 wrote to memory of 1176 2028 E-DEKONT.exe E-DEKONT.exe PID 2028 wrote to memory of 1176 2028 E-DEKONT.exe E-DEKONT.exe PID 1176 wrote to memory of 1988 1176 E-DEKONT.exe E-DEKONT.exe PID 1176 wrote to memory of 1988 1176 E-DEKONT.exe E-DEKONT.exe PID 1176 wrote to memory of 1988 1176 E-DEKONT.exe E-DEKONT.exe PID 1176 wrote to memory of 1988 1176 E-DEKONT.exe E-DEKONT.exe PID 1988 wrote to memory of 1972 1988 E-DEKONT.exe E-DEKONT.exe PID 1988 wrote to memory of 1972 1988 E-DEKONT.exe E-DEKONT.exe PID 1988 wrote to memory of 1972 1988 E-DEKONT.exe E-DEKONT.exe PID 1988 wrote to memory of 1972 1988 E-DEKONT.exe E-DEKONT.exe PID 1972 wrote to memory of 1964 1972 E-DEKONT.exe E-DEKONT.exe PID 1972 wrote to memory of 1964 1972 E-DEKONT.exe E-DEKONT.exe PID 1972 wrote to memory of 1964 1972 E-DEKONT.exe E-DEKONT.exe PID 1972 wrote to memory of 1964 1972 E-DEKONT.exe E-DEKONT.exe PID 1964 wrote to memory of 1796 1964 E-DEKONT.exe E-DEKONT.exe PID 1964 wrote to memory of 1796 1964 E-DEKONT.exe E-DEKONT.exe PID 1964 wrote to memory of 1796 1964 E-DEKONT.exe E-DEKONT.exe PID 1964 wrote to memory of 1796 1964 E-DEKONT.exe E-DEKONT.exe PID 1796 wrote to memory of 1752 1796 E-DEKONT.exe E-DEKONT.exe PID 1796 wrote to memory of 1752 1796 E-DEKONT.exe E-DEKONT.exe PID 1796 wrote to memory of 1752 1796 E-DEKONT.exe E-DEKONT.exe PID 1796 wrote to memory of 1752 1796 E-DEKONT.exe E-DEKONT.exe PID 1752 wrote to memory of 1788 1752 E-DEKONT.exe E-DEKONT.exe PID 1752 wrote to memory of 1788 1752 E-DEKONT.exe E-DEKONT.exe PID 1752 wrote to memory of 1788 1752 E-DEKONT.exe E-DEKONT.exe PID 1752 wrote to memory of 1788 1752 E-DEKONT.exe E-DEKONT.exe PID 1788 wrote to memory of 1804 1788 E-DEKONT.exe E-DEKONT.exe PID 1788 wrote to memory of 1804 1788 E-DEKONT.exe E-DEKONT.exe PID 1788 wrote to memory of 1804 1788 E-DEKONT.exe E-DEKONT.exe PID 1788 wrote to memory of 1804 1788 E-DEKONT.exe E-DEKONT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"8⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"9⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"C:\Users\Admin\AppData\Local\Temp\E-DEKONT.exe"10⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/800-2-0x0000000076C21000-0x0000000076C23000-memory.dmpFilesize
8KB
-
memory/1176-5-0x0000000000000000-mapping.dmp
-
memory/1752-15-0x0000000000000000-mapping.dmp
-
memory/1788-17-0x0000000000000000-mapping.dmp
-
memory/1796-13-0x0000000000000000-mapping.dmp
-
memory/1804-19-0x0000000000000000-mapping.dmp
-
memory/1804-21-0x0000000000400000-0x000000000044D000-memory.dmpFilesize
308KB
-
memory/1964-11-0x0000000000000000-mapping.dmp
-
memory/1972-9-0x0000000000000000-mapping.dmp
-
memory/1988-7-0x0000000000000000-mapping.dmp
-
memory/2028-3-0x0000000000000000-mapping.dmp