Analysis
-
max time kernel
126s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 03:02
Static task
static1
Behavioral task
behavioral1
Sample
259206e6fbda6b46e6499e518adcaf96.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
259206e6fbda6b46e6499e518adcaf96.exe
Resource
win10v2004-20231215-en
General
-
Target
259206e6fbda6b46e6499e518adcaf96.exe
-
Size
613KB
-
MD5
259206e6fbda6b46e6499e518adcaf96
-
SHA1
3c2a4bb622685d3e250d4566d25aa244e18f0086
-
SHA256
fed60d381e993a084cbde0147f445309d00a69b6be01aeebace31acdb424a91f
-
SHA512
9f2d873a853ed0494cb7326286c0dd2e338b5422ecbd221f9bda831a205953ece096e297c248a89f477f7e89755b204ab7181fb2c991df489e3270b62aa42c6f
-
SSDEEP
12288:H12OsBgo0q4wM/VkGjkfoX89JrFM02XweWFdPcYiQAqwQikKCTwE47:4OsBgo0q4wM2ykfosfriwPFdPKQAqwMn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ggraco.com - Port:
587 - Username:
[email protected] - Password:
admin@#1235
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral1/memory/2680-21-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2680-23-0x0000000001FD0000-0x0000000002010000-memory.dmp family_agenttesla behavioral1/memory/2680-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2680-16-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2680-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2680-10-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2368-3-0x0000000000460000-0x0000000000472000-memory.dmp CustAttr -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 259206e6fbda6b46e6499e518adcaf96.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 259206e6fbda6b46e6499e518adcaf96.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 259206e6fbda6b46e6499e518adcaf96.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 259206e6fbda6b46e6499e518adcaf96.exe 2680 259206e6fbda6b46e6499e518adcaf96.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2680 259206e6fbda6b46e6499e518adcaf96.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 PID 2368 wrote to memory of 2680 2368 259206e6fbda6b46e6499e518adcaf96.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 259206e6fbda6b46e6499e518adcaf96.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 259206e6fbda6b46e6499e518adcaf96.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\259206e6fbda6b46e6499e518adcaf96.exe"C:\Users\Admin\AppData\Local\Temp\259206e6fbda6b46e6499e518adcaf96.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\259206e6fbda6b46e6499e518adcaf96.exe"C:\Users\Admin\AppData\Local\Temp\259206e6fbda6b46e6499e518adcaf96.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2680
-