Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
CV Mariana Alvarez.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CV Mariana Alvarez.exe
Resource
win10v2004-20231215-en
General
-
Target
CV Mariana Alvarez.exe
-
Size
621KB
-
MD5
d6a2dcc723915b657a3285154bb7124b
-
SHA1
bea457ad6cea2ec7a1e2a334447c4982a54f9183
-
SHA256
fcb91d1cf9fced1a4f371128695136e668b311768dd02ef0b3ffa051eb396af8
-
SHA512
3607119c5457205477ffd67cec038bd6c3a3b28da08710b20ea065d38a5d788f284b56fe793696ddc9c5f9df12e60c7fcf3396debe09b7ee221bc058bf0f4cd8
-
SSDEEP
12288:aetvVc0SyqhGMrBd5/yDMa9EK1jLwMnH4JemuczN:aer0X1j5/aJ1jLLH4gpc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.flying-fish-cn.com - Port:
587 - Username:
[email protected] - Password:
hkk999@@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1248 set thread context of 2704 1248 CV Mariana Alvarez.exe 28 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 1248 CV Mariana Alvarez.exe 2704 CV Mariana Alvarez.exe 2704 CV Mariana Alvarez.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1248 CV Mariana Alvarez.exe Token: SeDebugPrivilege 2704 CV Mariana Alvarez.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28 PID 1248 wrote to memory of 2704 1248 CV Mariana Alvarez.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\CV Mariana Alvarez.exe"C:\Users\Admin\AppData\Local\Temp\CV Mariana Alvarez.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\CV Mariana Alvarez.exe"C:\Users\Admin\AppData\Local\Temp\CV Mariana Alvarez.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-