Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe
Resource
win10v2004-20230703-en
General
-
Target
SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe
-
Size
969KB
-
MD5
78f43948831492977dca697e6ceaa6ae
-
SHA1
58631fa7789db2771bf64702c13d47c285b846cc
-
SHA256
fe1b1d519bca018fe9ae3754b85a0c649dd8be1b30a6ac528704b3ef2ee80bb0
-
SHA512
1297a6912deb8c4f5f5f2f44c940473bdfef3ce122e16d3e5819a0cde458c92621d09a3950878aa461793724e5d4587ff35ded03c82dfbff94ac0a5001333ba1
-
SSDEEP
12288:7Rf5gSWrI1+Z/EG6oqQ9Fi49Q4dRlgobfUl80euneZ2:x62MRqQ5zRPcHln
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.kbakr.com - Port:
587 - Username:
[email protected] - Password:
If e an yi 22$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 api.ipify.org 36 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4344 set thread context of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 580 RegSvcs.exe 580 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe Token: SeDebugPrivilege 580 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4308 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 90 PID 4344 wrote to memory of 4308 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 90 PID 4344 wrote to memory of 4308 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 90 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91 PID 4344 wrote to memory of 580 4344 SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.MSILRandomKrypt.3.18459.29183.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵PID:4308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-