Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2023 01:48

General

  • Target

    2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1.exe

  • Size

    235KB

  • MD5

    cc8685cd09b9df0a973e80c1428d228f

  • SHA1

    f42533d0f15f0ec71b842e6c96c72db60477e1cd

  • SHA256

    2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1

  • SHA512

    a104ceba2f1a586a09497ca50cf54b660e112f86217102add06e125699afe6e69f47a286549ecf6612872f9f31f2e36f581981618cde1c7d9ca005c2f31ae579

  • SSDEEP

    3072:+luGyuym+Y1Z1Wb5yxgbTm3ydRWzUh15APfxHE6o:+luGyuym+Y1Z1Wb5wgbTMCWzUhYfNEr

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pharmapanel.com.ar
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Pharma23Panel90

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1.exe
    "C:\Users\Admin\AppData\Local\Temp\2c2e9d772aec9f6700b9a83f7b9386bc0fd1b48d0b1131dd49c46aa859cdffb1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1004-1-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/1004-0-0x0000000000560000-0x00000000005A2000-memory.dmp

    Filesize

    264KB

  • memory/1004-2-0x0000000005670000-0x0000000005C14000-memory.dmp

    Filesize

    5.6MB

  • memory/1004-3-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/1004-4-0x0000000005130000-0x0000000005196000-memory.dmp

    Filesize

    408KB

  • memory/1004-5-0x0000000005D80000-0x0000000005DD0000-memory.dmp

    Filesize

    320KB

  • memory/1004-6-0x0000000005E70000-0x0000000005F0C000-memory.dmp

    Filesize

    624KB

  • memory/1004-7-0x0000000006430000-0x00000000064C2000-memory.dmp

    Filesize

    584KB

  • memory/1004-8-0x0000000006400000-0x000000000640A000-memory.dmp

    Filesize

    40KB

  • memory/1004-9-0x0000000074EE0000-0x0000000075690000-memory.dmp

    Filesize

    7.7MB

  • memory/1004-10-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB