Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 01:09
Behavioral task
behavioral1
Sample
fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe
Resource
win10v2004-20231215-en
General
-
Target
fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe
-
Size
235KB
-
MD5
45000ae299dd541c591aaa34691e05fc
-
SHA1
f5d330acefb765b73107d373876f02c62036a062
-
SHA256
fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e
-
SHA512
58e2d2c1f6ac47f482ee430ec96ffb443effcd80389a3d80e98d6b7993b19668b0bdfb0303c6bd0060c8299ffc40a4211167bb302721547b2fab3b973c9d158b
-
SSDEEP
3072:QqjieCmyj7Z0Q0SFtbwR1GQs3/EhS5hhJNme:QkieCmyj7Z0Q0SFtbwR1ps3/Eh6J8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tecnosilos.com.py - Port:
587 - Username:
[email protected] - Password:
wY],Z[mo8kxz - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe 1604 fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1604 fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe"C:\Users\Admin\AppData\Local\Temp\fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604