Analysis

  • max time kernel
    148s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 16:04

General

  • Target

    Proforma Invoice 3315.exe

  • Size

    234KB

  • MD5

    30a0948bd1acab57b4b132365fa9e01d

  • SHA1

    0d996a2b5c4bb3364c58343350f98ea421265604

  • SHA256

    e21cbcbb1005efb933b99b1e09a12c333b1fadc391ebde3e1261b83559082455

  • SHA512

    894d6e2753c1e7a2d5e1c4c23ee225ac7d84331f8cdd542f362af1c5fc39268cd79d2feba1d08f9a4b7dd71707640d4cbd4c5462145b0841b5da966ebdee9f44

  • SSDEEP

    3072:000klR1ZljJlD8jjfCbl12bipf0byv55crKBY:000klR1ZlllD8jjfCbBpf0bykre

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ahlada.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    21rY$9U}48j]

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Proforma Invoice 3315.exe
    "C:\Users\Admin\AppData\Local\Temp\Proforma Invoice 3315.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4312-1-0x00000000751C0000-0x0000000075970000-memory.dmp

    Filesize

    7.7MB

  • memory/4312-0-0x00000000007D0000-0x0000000000810000-memory.dmp

    Filesize

    256KB

  • memory/4312-2-0x00000000058E0000-0x0000000005E84000-memory.dmp

    Filesize

    5.6MB

  • memory/4312-3-0x0000000005220000-0x0000000005230000-memory.dmp

    Filesize

    64KB

  • memory/4312-4-0x0000000005190000-0x00000000051F6000-memory.dmp

    Filesize

    408KB

  • memory/4312-5-0x0000000006850000-0x00000000068A0000-memory.dmp

    Filesize

    320KB

  • memory/4312-6-0x0000000006940000-0x00000000069DC000-memory.dmp

    Filesize

    624KB

  • memory/4312-7-0x0000000006A80000-0x0000000006B12000-memory.dmp

    Filesize

    584KB

  • memory/4312-8-0x0000000006A00000-0x0000000006A0A000-memory.dmp

    Filesize

    40KB

  • memory/4312-9-0x00000000751C0000-0x0000000075970000-memory.dmp

    Filesize

    7.7MB

  • memory/4312-10-0x0000000005220000-0x0000000005230000-memory.dmp

    Filesize

    64KB