Analysis
-
max time kernel
44s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
28-06-2023 07:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c4df006e39809b6857f3cc9117fa2088.exe
Resource
win7-20230621-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c4df006e39809b6857f3cc9117fa2088.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
c4df006e39809b6857f3cc9117fa2088.exe
-
Size
774KB
-
MD5
c4df006e39809b6857f3cc9117fa2088
-
SHA1
cd5ae28a1037aa467b507f533a3361383a954cf6
-
SHA256
ccc2705cc016a910af89b39b5beeca2885eedd714cca5ab153b416c201d0ea96
-
SHA512
aa175d94622ae6b55b0ea77783b838877a852c4d7884c759eff1bb6b8df55e81d170a4848fc9892e3a3ceaf781bc4a6771e2ff01cf80ae8af6c32389202f5945
-
SSDEEP
12288:PNnGCF9QcI5Szby9RkQEt1LgYaHxFBF4EllnGFveYp3wvmcC:PFGCocNwRkXMrBiylGFvervs
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
qnfivqsjvejrdkuz - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1744 set thread context of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28 PID 1744 wrote to memory of 1108 1744 c4df006e39809b6857f3cc9117fa2088.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4df006e39809b6857f3cc9117fa2088.exe"C:\Users\Admin\AppData\Local\Temp\c4df006e39809b6857f3cc9117fa2088.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\c4df006e39809b6857f3cc9117fa2088.exe"C:\Users\Admin\AppData\Local\Temp\c4df006e39809b6857f3cc9117fa2088.exe"2⤵PID:1108
-