Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
404e6aba818bcec2cfebe11f2fa9d557.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
404e6aba818bcec2cfebe11f2fa9d557.exe
Resource
win10v2004-20231215-en
General
-
Target
404e6aba818bcec2cfebe11f2fa9d557.exe
-
Size
804KB
-
MD5
404e6aba818bcec2cfebe11f2fa9d557
-
SHA1
17e86a5790521fe516e8f4a5299eb3d931eea327
-
SHA256
71cb90765301ebbaa989b1ee8c1433def78ffda344f19be64a3a57afe296d293
-
SHA512
d72c474c838be696e11b27ea478676faa98cb08c8bd3aa2235f3bd23c7d814991c5aa06b0c215036c9852fb24ec21dc7b07c9423ceead51d4510a8fdf33fa73f
-
SSDEEP
12288:++IWjT4AnZloR65AXwgFvuSSBIL4hmrK48ft4t88q7z+q+ApldAX5yFVu/BEVl0R:++5oR6qgYaft4ef+T10U5EP0bV
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1883321234:AAG_9SFLBWQtrLAcZi4KtuAJ1wTnnOyL5Fg/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4880-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1080 set thread context of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4880 404e6aba818bcec2cfebe11f2fa9d557.exe 4880 404e6aba818bcec2cfebe11f2fa9d557.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4880 404e6aba818bcec2cfebe11f2fa9d557.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101 PID 1080 wrote to memory of 4880 1080 404e6aba818bcec2cfebe11f2fa9d557.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\404e6aba818bcec2cfebe11f2fa9d557.exe"C:\Users\Admin\AppData\Local\Temp\404e6aba818bcec2cfebe11f2fa9d557.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\404e6aba818bcec2cfebe11f2fa9d557.exe"C:\Users\Admin\AppData\Local\Temp\404e6aba818bcec2cfebe11f2fa9d557.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-