Analysis
-
max time kernel
43s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
056c3769a51cbae4e0d61d89f45a857b.exe
Resource
win7-20231215-en
General
-
Target
056c3769a51cbae4e0d61d89f45a857b.exe
-
Size
759KB
-
MD5
056c3769a51cbae4e0d61d89f45a857b
-
SHA1
03c65baab74eac7c8ed2d43ff6c928c1e8d4f411
-
SHA256
51e70e3292e217da70cfcb15c86a2141256c54cbeb34d0ad662dd6462ddffb70
-
SHA512
e4e65a617e0558b748531c2731956d96371d20fd16f8a9dba8b142ad51dc63b0e18a3ebe627693a560ad87e1f31af57950a086e03adcb90e22eed33d34f7efcf
-
SSDEEP
12288:efIkfVnlb8uYhkOH7hooLFo0DGy6RIq/hlJ:efI4Vlb853WoLC0DGZ5V
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Heaven11
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4936-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 4936 InstallUtil.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/5080-7-0x0000000006C30000-0x0000000006C58000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5080 set thread context of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5080 056c3769a51cbae4e0d61d89f45a857b.exe 5080 056c3769a51cbae4e0d61d89f45a857b.exe 5080 056c3769a51cbae4e0d61d89f45a857b.exe 4936 InstallUtil.exe 4936 InstallUtil.exe 4936 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5080 056c3769a51cbae4e0d61d89f45a857b.exe Token: SeDebugPrivilege 4936 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102 PID 5080 wrote to memory of 4936 5080 056c3769a51cbae4e0d61d89f45a857b.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\056c3769a51cbae4e0d61d89f45a857b.exe"C:\Users\Admin\AppData\Local\Temp\056c3769a51cbae4e0d61d89f45a857b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5ee11e7c74155139dfb635b73d28c1b87
SHA16946fa1a74fb0679a24982562415dd90ea74451d
SHA256c04a3f9598a739deff474387d69cd8091dc35952eea775cf5dcbaed24adb70d0
SHA512e93272b23bd1dd7e6e421ac96b3190e8d5ad4298930c47a6c23f1b54bbd413ea0e276196a8e960830907183fa4515a5e4c4b663f6d3856c3649e163c31b31a06
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159