Overview
overview
10Static
static
32206a8ec94...2b.exe
windows7-x64
102206a8ec94...2b.exe
windows10-2004-x64
102266d028b4...34.exe
windows7-x64
102266d028b4...34.exe
windows10-2004-x64
102416ea6bdb...16.exe
windows7-x64
102416ea6bdb...16.exe
windows10-2004-x64
103811e99f20...69.exe
windows7-x64
103811e99f20...69.exe
windows10-2004-x64
104376b18805...8a.exe
windows7-x64
104376b18805...8a.exe
windows10-2004-x64
104655d3e893...cb.exe
windows7-x64
104655d3e893...cb.exe
windows10-2004-x64
10832c205e98...19.exe
windows7-x64
10832c205e98...19.exe
windows10-2004-x64
10901a8b668a...c0.exe
windows7-x64
10901a8b668a...c0.exe
windows10-2004-x64
10929a61aec3...d0.exe
windows7-x64
10929a61aec3...d0.exe
windows10-2004-x64
10995f49454c...91.exe
windows7-x64
10995f49454c...91.exe
windows10-2004-x64
10Analysis
-
max time kernel
136s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
2206a8ec9412f21394074c440d06362b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2206a8ec9412f21394074c440d06362b.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
2266d028b418dd59fb82994ae4557134.exe
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
2266d028b418dd59fb82994ae4557134.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
2416ea6bdb302537f7e7f8161cbc6116.exe
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
2416ea6bdb302537f7e7f8161cbc6116.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
3811e99f207240971d637064c8796e69.exe
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
3811e99f207240971d637064c8796e69.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
4376b188058ea90fceaa3d49caa7dd8a.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
4376b188058ea90fceaa3d49caa7dd8a.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
4655d3e893aa264e7c15edf3893362cb.exe
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
4655d3e893aa264e7c15edf3893362cb.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
832c205e98869a4743d66848d2e3c519.exe
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
832c205e98869a4743d66848d2e3c519.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
901a8b668a797004226658495f79f9c0.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
901a8b668a797004226658495f79f9c0.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
929a61aec3ce01dec7206d71e13948d0.exe
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
929a61aec3ce01dec7206d71e13948d0.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
995f49454cab4d1a79a73620a454a191.exe
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
995f49454cab4d1a79a73620a454a191.exe
Resource
win10v2004-20231025-en
General
-
Target
3811e99f207240971d637064c8796e69.exe
-
Size
355KB
-
MD5
3811e99f207240971d637064c8796e69
-
SHA1
c69549b08e786f767e8474e201b08e1d324f1ca1
-
SHA256
4956c7edc7eb8765ab322d700fb15d2d5132f1f54fec7c1a46b6e7da78e81b5c
-
SHA512
012cd19102e841b3df5de816853ff156c0a33bc6eedfef131656f3bced27e4150ee8c46bb9abbe8d37ed145ca281fd8f012062c7e65f1b44e5b051219791074a
-
SSDEEP
6144:gky3ziMeSMLYa4phyX8s2s8xkLVNogLXax1vj5:l2uMeSMLCbsGkLVNTXW
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.grupomorales.mx - Port:
587 - Username:
[email protected] - Password:
)h9EJhF-LdMb - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3860 set thread context of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1884 Caspol.exe 1884 Caspol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1884 Caspol.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 PID 3860 wrote to memory of 1884 3860 3811e99f207240971d637064c8796e69.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3811e99f207240971d637064c8796e69.exe"C:\Users\Admin\AppData\Local\Temp\3811e99f207240971d637064c8796e69.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1884
-