Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2023 01:48

General

  • Target

    2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1.exe

  • Size

    235KB

  • MD5

    cc8685cd09b9df0a973e80c1428d228f

  • SHA1

    f42533d0f15f0ec71b842e6c96c72db60477e1cd

  • SHA256

    2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1

  • SHA512

    a104ceba2f1a586a09497ca50cf54b660e112f86217102add06e125699afe6e69f47a286549ecf6612872f9f31f2e36f581981618cde1c7d9ca005c2f31ae579

  • SSDEEP

    3072:+luGyuym+Y1Z1Wb5yxgbTm3ydRWzUh15APfxHE6o:+luGyuym+Y1Z1Wb5wgbTMCWzUhYfNEr

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1.exe
    "C:\Users\Admin\AppData\Local\Temp\2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2912-0-0x0000000000D00000-0x0000000000D42000-memory.dmp

    Filesize

    264KB

  • memory/2912-1-0x0000000074550000-0x0000000074C3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2912-2-0x00000000043D0000-0x0000000004410000-memory.dmp

    Filesize

    256KB

  • memory/2912-3-0x0000000074550000-0x0000000074C3E000-memory.dmp

    Filesize

    6.9MB