Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 01:09

General

  • Target

    fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe

  • Size

    235KB

  • MD5

    45000ae299dd541c591aaa34691e05fc

  • SHA1

    f5d330acefb765b73107d373876f02c62036a062

  • SHA256

    fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e

  • SHA512

    58e2d2c1f6ac47f482ee430ec96ffb443effcd80389a3d80e98d6b7993b19668b0bdfb0303c6bd0060c8299ffc40a4211167bb302721547b2fab3b973c9d158b

  • SSDEEP

    3072:QqjieCmyj7Z0Q0SFtbwR1GQs3/EhS5hhJNme:QkieCmyj7Z0Q0SFtbwR1ps3/Eh6J8

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe
    "C:\Users\Admin\AppData\Local\Temp\fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1604-1-0x00000000749C0000-0x00000000750AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1604-0-0x0000000000070000-0x00000000000B2000-memory.dmp

    Filesize

    264KB

  • memory/1604-2-0x0000000000700000-0x0000000000740000-memory.dmp

    Filesize

    256KB

  • memory/1604-3-0x00000000749C0000-0x00000000750AE000-memory.dmp

    Filesize

    6.9MB

  • memory/1604-4-0x0000000000700000-0x0000000000740000-memory.dmp

    Filesize

    256KB