Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 01:09

General

  • Target

    fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe

  • Size

    235KB

  • MD5

    45000ae299dd541c591aaa34691e05fc

  • SHA1

    f5d330acefb765b73107d373876f02c62036a062

  • SHA256

    fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e

  • SHA512

    58e2d2c1f6ac47f482ee430ec96ffb443effcd80389a3d80e98d6b7993b19668b0bdfb0303c6bd0060c8299ffc40a4211167bb302721547b2fab3b973c9d158b

  • SSDEEP

    3072:QqjieCmyj7Z0Q0SFtbwR1GQs3/EhS5hhJNme:QkieCmyj7Z0Q0SFtbwR1ps3/Eh6J8

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe
    "C:\Users\Admin\AppData\Local\Temp\fa7a2eac707b3645601c990289f6a5e83fce46cb3f26e5de9f22cfdb002a275e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4588-0-0x0000000000CD0000-0x0000000000D12000-memory.dmp

          Filesize

          264KB

        • memory/4588-1-0x0000000074400000-0x0000000074BB0000-memory.dmp

          Filesize

          7.7MB

        • memory/4588-2-0x0000000005F70000-0x0000000006514000-memory.dmp

          Filesize

          5.6MB

        • memory/4588-3-0x00000000059B0000-0x00000000059C0000-memory.dmp

          Filesize

          64KB

        • memory/4588-4-0x0000000005850000-0x00000000058B6000-memory.dmp

          Filesize

          408KB

        • memory/4588-5-0x0000000006670000-0x00000000066C0000-memory.dmp

          Filesize

          320KB

        • memory/4588-6-0x0000000006760000-0x00000000067FC000-memory.dmp

          Filesize

          624KB

        • memory/4588-7-0x0000000006D20000-0x0000000006DB2000-memory.dmp

          Filesize

          584KB

        • memory/4588-8-0x0000000006CA0000-0x0000000006CAA000-memory.dmp

          Filesize

          40KB

        • memory/4588-9-0x0000000074400000-0x0000000074BB0000-memory.dmp

          Filesize

          7.7MB

        • memory/4588-10-0x00000000059B0000-0x00000000059C0000-memory.dmp

          Filesize

          64KB