Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 02:30
Static task
static1
Behavioral task
behavioral1
Sample
92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe
Resource
win10v2004-20231130-en
General
-
Target
92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe
-
Size
485KB
-
MD5
6ccbacbec6b83823e89343cc5ae9681a
-
SHA1
29f2e915e040956f9540abdaf0b8e4df917623b4
-
SHA256
92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73
-
SHA512
9ca4bdc4d54edd0bdb3e4951ecd978e77690ec57877d694538dbd9bf38a053d487355ec7aa8c34e5bfc593689ead0d40a4549a11ac1d4af44c0fb5b56480a66c
-
SSDEEP
12288:WckpUOtJHdogrQCUcMNtYfLvAFiwCHoEbjr:W7asodCUcMkYF6t
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6760916656:AAFTROumNysgqsjoqAvyBqjbR9y3VV4we2Y/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\adobe = "C:\\Users\\Admin\\AppData\\Roaming\\adobe\\adobe.exe" 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2688 ipconfig.exe 2572 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 2696 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe Token: SeDebugPrivilege 2696 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2972 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 28 PID 2204 wrote to memory of 2972 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 28 PID 2204 wrote to memory of 2972 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 28 PID 2204 wrote to memory of 2972 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 28 PID 2972 wrote to memory of 2688 2972 cmd.exe 30 PID 2972 wrote to memory of 2688 2972 cmd.exe 30 PID 2972 wrote to memory of 2688 2972 cmd.exe 30 PID 2972 wrote to memory of 2688 2972 cmd.exe 30 PID 2204 wrote to memory of 2668 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 31 PID 2204 wrote to memory of 2668 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 31 PID 2204 wrote to memory of 2668 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 31 PID 2204 wrote to memory of 2668 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 31 PID 2668 wrote to memory of 2572 2668 cmd.exe 33 PID 2668 wrote to memory of 2572 2668 cmd.exe 33 PID 2668 wrote to memory of 2572 2668 cmd.exe 33 PID 2668 wrote to memory of 2572 2668 cmd.exe 33 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34 PID 2204 wrote to memory of 2696 2204 92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe"C:\Users\Admin\AppData\Local\Temp\92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exeC:\Users\Admin\AppData\Local\Temp\92b5688c048ffe742eb8ba8b880cd60477db568a57e60dc1ce7a2dc65b4d9d73.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-