Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 10:43
Static task
static1
Behavioral task
behavioral1
Sample
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe
Resource
win10v2004-20231130-en
General
-
Target
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe
-
Size
973KB
-
MD5
5894c2a089c25a7a7dc24c26e27496af
-
SHA1
7c858439cee8de3eb09443bd65f706ce94451cfe
-
SHA256
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15
-
SHA512
1664a1ac2918b86ecfcf4454cc550915889d0a5081b795d8827958ac694561cdb0f5a6bcbc4ef07a62027be46ee400eeb66c5ffc42b15a39a4e13bd617e1f871
-
SSDEEP
12288:+3copox4TQJRw04grHB+MkWotBgbPoPgn80pdKQ1VUF+UoNoeApXL4fMxZr:7e/WRw0Rd+MhwB+Qk97rN9+eApEfS
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1179011823245217852/BApmSysJ7ds4rFscxhzRAHKJv1hyP1UFKhyfN1ojsei9HMF0L9z-hwZZiDIGOsncVkXv
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exedescription pid process target process PID 2176 set thread context of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exepid process 2280 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe 2280 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exedescription pid process Token: SeDebugPrivilege 2280 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exedescription pid process target process PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe PID 2176 wrote to memory of 2280 2176 e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe"C:\Users\Admin\AppData\Local\Temp\e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe"C:\Users\Admin\AppData\Local\Temp\e054f78b7058dbc3166df6483cf322288502ca0866daf6421504d57565a0aa15.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280