Analysis

  • max time kernel
    92s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    19-04-2021 12:42

General

  • Target

    dump.exe

  • Size

    667KB

  • MD5

    a5edc227389610e83ea8275c3ecb38f8

  • SHA1

    3f2d3380d0e1d600b0f304714a39bcd5def219be

  • SHA256

    bf6374ead4f824c937cb4a8ca8f2ad891c7c8e34607c32ad1b73a8eba5b8d2a3

  • SHA512

    7cd0408b9eb602b1e22cccb74c3ccaa52e7e86bedafcb5bf8d157cf9797feddcee32e3c06b4ffced5399b34ae9bec85114e40591ec94a058ea8c6b435629d826

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Facebook005

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\dump.exe
    "C:\Users\Admin\AppData\Local\Temp\dump.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-114-0x00000000009B0000-0x00000000009B1000-memory.dmp
    Filesize

    4KB

  • memory/900-116-0x00000000012A0000-0x00000000012D7000-memory.dmp
    Filesize

    220KB

  • memory/900-117-0x0000000001350000-0x0000000001352000-memory.dmp
    Filesize

    8KB