Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2023 01:45

General

  • Target

    bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58.exe

  • Size

    235KB

  • MD5

    7911215edc491695bf598dbff6f1d0c1

  • SHA1

    2eba02407a65333a3675b0bafda8ddd3f2f7fc99

  • SHA256

    bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58

  • SHA512

    e0c8c566925d0fd15b105270ca2c6599597502df6876378e6f676cc4e0ee2d05c36ba73210412c7eaf7bb051051087867e7c6921ff88533b0e2a9a8a263426c6

  • SSDEEP

    6144:UR1ZlxGUdnFTKh6BbiYHXvf4Ax+C0c+g:UR1ZlxGUdnFKobf/jMX

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.elec-qatar.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MHabrar2019@#

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58.exe
    "C:\Users\Admin\AppData\Local\Temp\bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/700-1-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/700-0-0x0000000000600000-0x0000000000642000-memory.dmp

    Filesize

    264KB

  • memory/700-2-0x0000000005650000-0x0000000005BF4000-memory.dmp

    Filesize

    5.6MB

  • memory/700-3-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/700-4-0x00000000051A0000-0x0000000005206000-memory.dmp

    Filesize

    408KB

  • memory/700-5-0x0000000005E20000-0x0000000005E70000-memory.dmp

    Filesize

    320KB

  • memory/700-6-0x0000000005F10000-0x0000000005FAC000-memory.dmp

    Filesize

    624KB

  • memory/700-7-0x0000000006390000-0x0000000006422000-memory.dmp

    Filesize

    584KB

  • memory/700-8-0x0000000006350000-0x000000000635A000-memory.dmp

    Filesize

    40KB

  • memory/700-9-0x0000000074920000-0x00000000750D0000-memory.dmp

    Filesize

    7.7MB

  • memory/700-10-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB