Analysis
-
max time kernel
100s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2023 02:32
Static task
static1
Behavioral task
behavioral1
Sample
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe
Resource
win10v2004-20231130-en
General
-
Target
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe
-
Size
258KB
-
MD5
65293cadc0467021b330d4248c666670
-
SHA1
af8f8b65d172a3b6ac355bd4e042b416062b1993
-
SHA256
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a
-
SHA512
1dfb47818d1a0336866f09aaa400a9b48bad542af47936e3a78910ea3885bc6704b4d54a04757d21f4caa5900c7d46e369700fcaea414c03639835f55d9bfd02
-
SSDEEP
6144:HQNCwXX3Z2hUX8A4+s/i0ZkA0CkSCObc5a/zyRv+:oBpCUMA4L/i0ZkA0TSCso
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://mydevelopmentstory.com - Port:
21 - Username:
[email protected] - Password:
ENugu@042EN
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org 6 ip-api.com -
Suspicious use of SetThreadContext 4 IoCs
Processes:
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exedescription pid process target process PID 3616 set thread context of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 set thread context of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 set thread context of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 set thread context of 1604 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exepid process 2536 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe 2536 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exedescription pid process Token: SeDebugPrivilege 2536 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exepid process 2536 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exedescription pid process target process PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 2536 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 3628 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1644 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1604 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1604 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1604 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe PID 3616 wrote to memory of 1604 3616 ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"2⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"2⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"C:\Users\Admin\AppData\Local\Temp\ac8b06ad0407f8c2f9d39bfa0f0683d0719272c8332e8d92b003ac386729e90a.exe"2⤵PID:1604