Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 15:06
Behavioral task
behavioral1
Sample
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
Resource
win10v2004-20231222-en
General
-
Target
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
-
Size
233KB
-
MD5
8b42cc290dfba3830c3d57c96aebd242
-
SHA1
0934ed2cf88e7c2f720a2a8c07158fee9a0eba41
-
SHA256
cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e
-
SHA512
13101479014c6e3af266e0afa54e2345df88f6e7cbe023788eee7c9b5c170432e6204af1a9b71b8aa64344ee3af8aff58dc68f11bbc408c82c1cb7b43bd33619
-
SSDEEP
3072:+u7Xjnbe9Q43OAL+VbQ8bM+6Wv5u1jVqj:D7Xjnbe9Q43OAL+V1bMjWAjc
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.cefin.bg - Port:
21 - Username:
[email protected] - Password:
#UuXy?6cIbL+
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 2 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1568 cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe 1568 cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1568 cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe"C:\Users\Admin\AppData\Local\Temp\cc658ef20e0e8a449f5e6028f8514db2d628f30d2d648cec718d69a1b61bd16e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568