Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 13:31
Behavioral task
behavioral1
Sample
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe
-
Size
264KB
-
MD5
c3a599dae02fd09c95c9cdb9bf104de4
-
SHA1
a10a5699b92a7e33232b7b3fa8bac65aa918f2ae
-
SHA256
4189945355a201fa49e9e7fde1a4c0d6ef0c4ac905bb08ded3efdd82675ad984
-
SHA512
bec3b4d5782ba6c7112d5afd69c1bcd753b090786546ed58ca269795c06dc93cb57c2222835487b82704f0a55678055f1c5ffac8c67d419ce363335156e04686
-
SSDEEP
3072:fmkphVxdIf+f1htg7aapRfokQXQ2zktFBE35wJvVl/tfuT2:fmk7VxdIf+rtg7JokQXQ2AtfPvVRT
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6381414841:AAFH0klFN21XG8PsAP5mFZBYcjb663pXP0E/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2058106572-1146578376-825901627-1000\Software\Microsoft\Windows\CurrentVersion\Run\localhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\localhost\\localhost.exe" 1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exepid process 3052 1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe 3052 1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exedescription pid process Token: SeDebugPrivilege 3052 1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exepid process 3052 1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1840-7-0x0000000000AE0000-0x0000000000B22000-memory.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3052