Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2023 22:48

General

  • Target

    Spoof/WindowsFormsApp2.exe

  • Size

    498KB

  • MD5

    077abb82b84ddc20f64c1fc01bd48b87

  • SHA1

    69a7f39503ec50d9305344cb09f2ab1afd736f7b

  • SHA256

    c7e2265f4e6bd4a1ed9dc47f04c213a893ecc799ad61e407320cfe928b317093

  • SHA512

    38002751eaec363e9890ec398d3f6975bf84823fd98ceadbaeb540a3b1ae38e948be912316fb61b7253d4fbada6f8bc527e4072ff68baa20c12b661f3d517f68

  • SSDEEP

    6144:fy64DBFSbj/fG2uGAKsGAKsGAKmGAK1ino4IL52GAK1ino4IL52GAK1ino4IL5:gFym2uGUGUG+GsnoQGsnoQGsno

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spoof\WindowsFormsApp2.exe
    "C:\Users\Admin\AppData\Local\Temp\Spoof\WindowsFormsApp2.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6bd311d96d6f744be9d7fbf1f3a0fba

    SHA1

    4aabf0ce8074d0ee10c3daa39be662388517c2db

    SHA256

    a9fe8070d5fa23efef7ec7a8317386d1cc300dd129dcdac72aad7b8569c1575a

    SHA512

    e731d413b5db0d09a242cbce8d5f45dd3697a4a346357ae0b4709e05bb21d78238cc31c77e1a1edc458ca0c9a5d77e4a546a0b8c6cf616b14dda52afeb396c4e

  • C:\Users\Admin\AppData\Local\Temp\CabABC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarB5B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1704-0-0x00000000002D0000-0x0000000000352000-memory.dmp

    Filesize

    520KB

  • memory/1704-1-0x00000000743F0000-0x0000000074ADE000-memory.dmp

    Filesize

    6.9MB

  • memory/1704-2-0x00000000020C0000-0x0000000002100000-memory.dmp

    Filesize

    256KB

  • memory/1704-3-0x0000000004DE0000-0x0000000004FF4000-memory.dmp

    Filesize

    2.1MB

  • memory/1704-4-0x00000000020C0000-0x0000000002100000-memory.dmp

    Filesize

    256KB

  • memory/1704-66-0x00000000743F0000-0x0000000074ADE000-memory.dmp

    Filesize

    6.9MB

  • memory/1704-67-0x00000000020C0000-0x0000000002100000-memory.dmp

    Filesize

    256KB

  • memory/1704-68-0x00000000020C0000-0x0000000002100000-memory.dmp

    Filesize

    256KB