Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe
Resource
win10v2004-20231215-en
General
-
Target
85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe
-
Size
741KB
-
MD5
9341b17fea0b6ed0eb2c904af804f77c
-
SHA1
96c99433699c39918f16151b2c24a1d5780d455c
-
SHA256
85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9
-
SHA512
eb6d26429a5a56432b3ca1521ba091a915ec269a8080b0b4c57dd1db4b3e7f91c7687bf379736dc69856942e5d82b72f008d254df88f7c01113a0d7df4cc7ad3
-
SSDEEP
12288:xkCQy/VZw/NwxgO43NvmcXNYLmVWXRH5wIaZZAvhq391PaOvFfV:Ojy/OiYceuy85AZGvUvpV
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6665708114:AAGlqK2_JNlXxxhbSB4vkXIExuLTH0TPR9g/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\skgpe = "C:\\Users\\Admin\\AppData\\Roaming\\skgpe\\skgpe.exe" 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1572 set thread context of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2404 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 2404 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2404 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28 PID 1572 wrote to memory of 2404 1572 85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe"C:\Users\Admin\AppData\Local\Temp\85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe"C:\Users\Admin\AppData\Local\Temp\85e2f1571b7a214c97af1f1ed776f2f3d8958abfcc7301d14f4d435984287af9.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2404
-