Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe
Resource
win10v2004-20231215-en
General
-
Target
5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe
-
Size
241KB
-
MD5
2d22839ba6762530af70e046e5a37760
-
SHA1
59d90e0a1a4cf2e9e2cfd922e295e333a88dea0c
-
SHA256
5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c
-
SHA512
d8b4f4cbd4eee2d205ac861d2e649dcf0ff802062946652f339ae4642273b3a9f5fdc155263776ba9515289bb7b5799e39b05ab9d856edb0190b1107ce9b8781
-
SSDEEP
6144:d0prHiS4sciYT7sfAj+Zu78Zj6k6iEIU0eafRVb:CMHiQIIjb8ZpCIJewjb
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1195357500636147762/wTcRg3fQF-X958tQhh_GUJFHQMIaKcScI699hXJZD2rma64AWMXB3KbXiRQwwWAEc8-8
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1088 aspnet_compiler.exe 1088 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1088 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28 PID 1732 wrote to memory of 1088 1732 5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe"C:\Users\Admin\AppData\Local\Temp\5e672c5d5e2a088b9c9da7d75321591d32e53f8a865bc625cf49f9bf26a4994c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-