Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe
Resource
win10v2004-20230703-en
General
-
Target
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe
-
Size
301KB
-
MD5
41279bcbfec0ec860dd662ea72006150
-
SHA1
06a32a46b9f2c49766f7f559c267571277fa6b7d
-
SHA256
5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8
-
SHA512
83ac2355c10bfc0c5a3eda87b243069b1a5bb3d84079a1d4e82a5da917b4c97799ea30be8eab6f8598768d62b2c73cb2ecfc46ae59dca3e17a6befc234e10154
-
SSDEEP
6144:/Ya61fAcGUqFKEi33DnhflyfeqR6SKvGChol6/lj:/YHZGrKEw3Dn7jqR7PCWe
Malware Config
Extracted
Protocol: smtp- Host:
smtp.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@#
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3904 set thread context of 2244 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe 2244 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3904 wrote to memory of 2244 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe 82 PID 3904 wrote to memory of 2244 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe 82 PID 3904 wrote to memory of 2244 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe 82 PID 3904 wrote to memory of 2244 3904 5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe"C:\Users\Admin\AppData\Local\Temp\5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe"C:\Users\Admin\AppData\Local\Temp\5b5381751013c31e8c08e428719cd3921a04cee5c623afc80bdd9bb61184bac8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5bf18a0a2cddbfb169118a27a103ce2c3
SHA107721981869927af3a3031260f6963995dd78341
SHA256017d033f7513f2eac5892f0db5fbf491a45f38b96bed683ee96ef775c42ea12a
SHA5122e730bd9aea0ea3c917f4cf8e54a551b69da2e405b8632dc54e8bece45ada8dbe3c026b933d8d0283eb17475214981ca105a81b7620380e98a319d6ea30aad12