Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
bank account.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bank account.exe
Resource
win10v2004-20231215-en
General
-
Target
bank account.exe
-
Size
780KB
-
MD5
a5640ac4a8b294df8ced6dfd0ca544f3
-
SHA1
94fc2bc720e88f5f1bcab268fd441c3f640d63c3
-
SHA256
c57c8d4d2e724683791c90f26d4499886ab0498688740b5433e1c4a36680564e
-
SHA512
c49a3f261ee1832bc41d887bf0b195ea707a4eb4fd15f46bd3ec55329169ae97d1953338e736532219b483b2954f76545544eb1e7fc632ea78c48b31bb012fbd
-
SSDEEP
12288:eTfMnM2iNv4sDFremgK+gxYdUwW+2FMkBZhnmZF4:O6M1usBremd+gxYY+2FMkcZF4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
Mail.jingtai.com.vn - Port:
587 - Username:
[email protected] - Password:
truongtuyen2209
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 4 IoCs
resource yara_rule behavioral1/memory/2920-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2920-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2920-17-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2920-19-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2920 2060 bank account.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2860 2060 bank account.exe 28 PID 2060 wrote to memory of 2860 2060 bank account.exe 28 PID 2060 wrote to memory of 2860 2060 bank account.exe 28 PID 2060 wrote to memory of 2860 2060 bank account.exe 28 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30 PID 2060 wrote to memory of 2920 2060 bank account.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bank account.exe"C:\Users\Admin\AppData\Local\Temp\bank account.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IVNmTSJGrzid" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8D9F.tmp"2⤵
- Creates scheduled task(s)
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\bank account.exe"{path}"2⤵PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d4e261004a53d73ab3cc158083403180
SHA1fc93cfe6aca933a59b8128054a8af1e8fb5a5023
SHA25678f0e1659c38edfe01d25ec88021f703e261243f8d608c2eefba11ecd7d680a9
SHA5122e4318697d36aa92df500c9e904987e9e61e5212afebc76b3f1b312f54094497e3380bdb81296d80c07ce444308baecdfae578e9ebf328b56994b6f9e63073be