Analysis
-
max time kernel
44s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:44
Static task
static1
Behavioral task
behavioral1
Sample
1649e10c12e3b6242ac80048b6623683.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1649e10c12e3b6242ac80048b6623683.exe
Resource
win10v2004-20231215-en
General
-
Target
1649e10c12e3b6242ac80048b6623683.exe
-
Size
1.4MB
-
MD5
1649e10c12e3b6242ac80048b6623683
-
SHA1
14a200da1c85b80e688673fcc26f4ac21cf9a6fe
-
SHA256
2d310d80e32cf06ccf6cc5e63e542283bc9a301a31215030733a1f733b0d2346
-
SHA512
db5905abd5caf3027d06b513cc3b590a27b090817b0e3deae03abb1f51778481cdf724e202a02f39a12847c72fb3e907aa074de74a00d1130a93f2a19677fb92
-
SSDEEP
24576:adOTNGD7beQ6fsJcPvKVdtNFS/E+FH/T2fXO:0qU9uknSL/T2/
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1775909572:AAGbTnqPuJBAUZrgQhid9SmcxSSNElS3rh8/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/1504-30-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1504-33-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1504-28-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1504-25-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1504-24-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2592 1972 1649e10c12e3b6242ac80048b6623683.exe 36 PID 1972 wrote to memory of 2592 1972 1649e10c12e3b6242ac80048b6623683.exe 36 PID 1972 wrote to memory of 2592 1972 1649e10c12e3b6242ac80048b6623683.exe 36 PID 1972 wrote to memory of 2592 1972 1649e10c12e3b6242ac80048b6623683.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LosJvWlPQthlo.exe"2⤵PID:2620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LosJvWlPQthlo.exe"2⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"2⤵PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LosJvWlPQthlo" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB57A.tmp"2⤵
- Creates scheduled task(s)
PID:2584
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"2⤵PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52617b5a1045ef6105771ff4fcb62a4a8
SHA161e5f11fdc3230b7ed209a19295b7f31ec395915
SHA256b89c669cd2cf16bf50de2200e2cab661d00bf48d98823c39f14761441ef6a6a9
SHA5124d820376b5936ac73ed2312b19e71b7c5b55de02f2759a1d8b0c283a93caacf165cfdd6582be100ce1c8f808160560a96731e109438198526f1581c3141b58f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EJ3LCPVNMGQIY3JQQYQ6.temp
Filesize7KB
MD524ad03cd538bdb72a2fbba45aa6eba62
SHA1bae2e7d001291fbdfc93ffe65e2403a302d352c7
SHA256e0016da8ebb325ed972857128d18f59e724a04affee9c69157f78810861d81f2
SHA51259f998df6e4f34b74c9bb5d98270d4fff93853b5bd79b09f4de0fd4f47d5a6541b066a276e7d7de5d38165b569c0f56001b3d3310bc6f0b8fd465346b96ba52a