Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2023 18:07
Static task
static1
Behavioral task
behavioral1
Sample
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
Resource
win10v2004-20231127-en
General
-
Target
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
-
Size
686KB
-
MD5
c16a6f4e8df4c64ef57fb7d5117edf7c
-
SHA1
74668c393f0d8a0d2c8c2dc469453de74d93ca87
-
SHA256
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944
-
SHA512
b4e676704d1a8f256334b85e6c9a1847ae78a2a7ec714b03e67e9c58b194491d16fa3b268475b89ddb01b74d0775f397ea26b9ddcb8f4e3353511490b0a87760
-
SSDEEP
12288:pYcopox4vvvoakgLfBpnXQVbCYnm1CQ+XfD0igd2pwDXkQz6:ReLvoIBpnKb5DQQ0igYQkQW
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ardsmmm.com - Port:
587 - Username:
[email protected] - Password:
Ard2015** - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exedescription pid process target process PID 2160 set thread context of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exepid process 2720 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 2720 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exedescription pid process Token: SeDebugPrivilege 2720 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exedescription pid process target process PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe PID 2160 wrote to memory of 2720 2160 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe 6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe"C:\Users\Admin\AppData\Local\Temp\6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe"C:\Users\Admin\AppData\Local\Temp\6e891dc16c6c450513d98831d79925b869e48fa94a50fe0f066620875e225944.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720