Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Arrival Notice.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
Arrival Notice.exe
-
Size
632KB
-
MD5
d5551d02842d0bca89645f6d2dcd9425
-
SHA1
60e703ba9b877189f2a5349cae2512de050bc76c
-
SHA256
558122a88015bea8cc58d92d22e752167ccf7d837d8d85a3070497471660de3a
-
SHA512
a30a933775af324a4f6662288fa52ac8336d96cbbf44ca2ff9a40411ec2a4b6e2817b8372337bf1a1c18e476c3304a6e9bb8c8bcb4e7f44664de4af17d5670ae
-
SSDEEP
12288:knJ+gIaWmooQ9gfWer8oDRGLndvQfaTGXc8YrN7n0x:GU9F9gfl8zBw/YrN7
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.wasstech.com - Port:
587 - Username:
[email protected] - Password:
Sunray2700@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Arrival Notice.exedescription pid Process procid_target PID 2080 set thread context of 2696 2080 Arrival Notice.exe 30 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Arrival Notice.exeRegSvcs.exepid Process 2080 Arrival Notice.exe 2080 Arrival Notice.exe 2080 Arrival Notice.exe 2696 RegSvcs.exe 2696 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Arrival Notice.exeRegSvcs.exedescription pid Process Token: SeDebugPrivilege 2080 Arrival Notice.exe Token: SeDebugPrivilege 2696 RegSvcs.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Arrival Notice.exedescription pid Process procid_target PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2728 2080 Arrival Notice.exe 28 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30 PID 2080 wrote to memory of 2696 2080 Arrival Notice.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Arrival Notice.exe"C:\Users\Admin\AppData\Local\Temp\Arrival Notice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-