Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231023-en
General
-
Target
tmp.exe
-
Size
270KB
-
MD5
b4dded313fdc038f0c45981a2066eaf9
-
SHA1
771de00f904c789115929a68b0e26c46ebfaa229
-
SHA256
30dccf81114caa5b3d72bc99e1f428abcea56abfbd795bd2cfa3daad84255ca5
-
SHA512
95515bc68bc6c1d558d327031cd2668a1a8926a90a6cae6eb3c8d9cefe240bb3261e7a0937e9ee7f649a5485dacf4f08c46fb7b0706621154da7d4cf156468a5
-
SSDEEP
3072:GgHGiSaJXXAu627/HmeSnsOGfuyMv9LMegPyii3uMgUHdpZy/BOWBvTyrMRlPnmQ:GgHGuHFRvSfGGyg5Me1p9Jubywn/bD
Malware Config
Extracted
Protocol: smtp- Host:
mail.bretoffice.com - Port:
587 - Username:
[email protected] - Password:
}&HF=G!r!_eA
Extracted
agenttesla
Protocol: smtp- Host:
mail.bretoffice.com - Port:
587 - Username:
[email protected] - Password:
}&HF=G!r!_eA - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2804 1824 tmp.exe 84 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1824 tmp.exe 1824 tmp.exe 2804 Caspol.exe 2804 Caspol.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1824 tmp.exe Token: SeDebugPrivilege 2804 Caspol.exe Token: SeManageVolumePrivilege 1068 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 Caspol.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1824 wrote to memory of 4708 1824 tmp.exe 83 PID 1824 wrote to memory of 4708 1824 tmp.exe 83 PID 1824 wrote to memory of 4708 1824 tmp.exe 83 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84 PID 1824 wrote to memory of 2804 1824 tmp.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵PID:4708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1068
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5de71eaebc53e9c6520b9febe0d9a04b4
SHA179591c6669390d5e32ef339ef0472ce4ca14a0c7
SHA25643606000790c4fb453f10900e37b9a1384aad6797ebf26183444f6ed88f6e78a
SHA512ab682a16a543a5dc844ece9bfbd9e828f49da57d052fac994c56552ee5eecf628711fd6c4bd8b1909deed801845905b1bae69f64786a4f1221085c40db7b45ca