Analysis
-
max time kernel
42s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
a2ed4963dfd45090c2112b7ba2422f86.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a2ed4963dfd45090c2112b7ba2422f86.exe
Resource
win10v2004-20231215-en
General
-
Target
a2ed4963dfd45090c2112b7ba2422f86.exe
-
Size
453KB
-
MD5
a2ed4963dfd45090c2112b7ba2422f86
-
SHA1
2bcef9993ffb483d5b7a8d482c00d33c71a28a02
-
SHA256
bcdf684939411112be33475b5422edf1f6b8219b0f1b786e1ad222d2ebbca6c1
-
SHA512
57891e845c2dcaf071ef6e5bae4a6cbb93789f563d84481d1447d4c36aa9f4f13f9d32d743672d8dcd293c1129c2f14e23804f7a19aaa8e0a3e9378e04b4d911
-
SSDEEP
6144:2Eul21llAVOCt6ZJJbrr8pMnGdBI+cHGBJqaavKrfO2zPmuliN63z3BlO:WEiCtIKGdBIjqJWKqpugN63H
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mohhg.com - Port:
587 - Username:
[email protected] - Password:
r:1{cNw4}vJc
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2864-22-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2864-19-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2864-17-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2864-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2864-11-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2596 1972 a2ed4963dfd45090c2112b7ba2422f86.exe 30 PID 1972 wrote to memory of 2596 1972 a2ed4963dfd45090c2112b7ba2422f86.exe 30 PID 1972 wrote to memory of 2596 1972 a2ed4963dfd45090c2112b7ba2422f86.exe 30 PID 1972 wrote to memory of 2596 1972 a2ed4963dfd45090c2112b7ba2422f86.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2ed4963dfd45090c2112b7ba2422f86.exe"C:\Users\Admin\AppData\Local\Temp\a2ed4963dfd45090c2112b7ba2422f86.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\a2ed4963dfd45090c2112b7ba2422f86.exe"{path}"2⤵PID:2864
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5203⤵PID:2128
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tQsJxm" /XML "C:\Users\Admin\AppData\Local\Temp\tmpABF8.tmp"2⤵
- Creates scheduled task(s)
PID:2596
-