Analysis
-
max time kernel
129s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe
Resource
win10v2004-20231215-en
General
-
Target
8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe
-
Size
839KB
-
MD5
8b9b26dba7fe35ecd8dc97b4c02cd9d4
-
SHA1
c614a731a3f6d2a3ac7d0aae85b39f15b0d0dfd3
-
SHA256
9be47030415729c21d29d6a7faf50bb25093585f6d4437339d647433e8f07e62
-
SHA512
e83747e88312c866ba157da2c7042c4c2bc41da64ed1de270c78ce193553fe27ff34fbe901d352b63f0cbd47c9e0df40543853c8a0628aa4c25088445842a912
-
SSDEEP
12288:XMjUWh2AqZAoR65AXwgFvuSSrISmAdaJc3u6CDW/tvAJWcF3TB3UcPLWaIxo9rQR:CJoR6qgrEc7egAJWcF31zPytheM
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
quutsuozucrxskyo
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral1/memory/2748-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-16-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-20-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-25-0x0000000004D70000-0x0000000004DB0000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 2748 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 PID 2244 wrote to memory of 2748 2244 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe"C:\Users\Admin\AppData\Local\Temp\8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe"C:\Users\Admin\AppData\Local\Temp\8b9b26dba7fe35ecd8dc97b4c02cd9d4.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2748
-