Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-12-2023 03:22
Static task
static1
Behavioral task
behavioral1
Sample
325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe
Resource
win10v2004-20231130-en
General
-
Target
325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe
-
Size
172KB
-
MD5
a281182a30c69580923abd430f149a8b
-
SHA1
33a7d202e3b02b06875a30151c3936cc6c944f04
-
SHA256
325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2
-
SHA512
7eb2320bbbd1ea83f909756b8186eee59fefe00b3933ac1a4fcb4c1f9b356f17a997776a6e48d073a04250097004f113a9a6574710c69c041bf47e91b75f4345
-
SSDEEP
3072:nAR2tHycSs7HRXW4jekWDzsdpO5XcTio1xbWuciwVIsT/sIqYak5QBtfUDAyP:nAR2py878iizspOcvuucVVIxIq6QLfUD
Malware Config
Extracted
Protocol: smtp- Host:
mail.etasimali.com - Port:
587 - Username:
[email protected] - Password:
RECRUTEMENT@2023
Extracted
agenttesla
Protocol: smtp- Host:
mail.etasimali.com - Port:
587 - Username:
[email protected] - Password:
RECRUTEMENT@2023 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exedescription pid process target process PID 2040 set thread context of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Caspol.exepid process 2792 Caspol.exe 2792 Caspol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Caspol.exedescription pid process Token: SeDebugPrivilege 2792 Caspol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Caspol.exepid process 2792 Caspol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exedescription pid process target process PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe PID 2040 wrote to memory of 2792 2040 325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe Caspol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe"C:\Users\Admin\AppData\Local\Temp\325b87e07c701b3d53533a07a60f6b50e806bef116c86b32bbc908f5bfc741a2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2792
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd71277fb44e617d58c965994da512f9
SHA1c2d19ac38085cfe6101b42c16e64c8e658ae40c9
SHA2560441e76fef82625bfa198b804cca9da1f305b6efa42d22488f4b113a5dfababb
SHA512dc6e0ad14bb5ecce4fb4a14db85932cf925d364a57be4eb2e21d2369cdeee85ab858f84a400b49e152d12e5110bca86a21a69d9d567a8a0be3a0a9ca32156de2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06