Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 14:39
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.2MB
-
MD5
a8b55bfc5d199e2c8c20947afa089bd2
-
SHA1
d0ca3ffca2ef6ddfe0ae2e7ad31054fd2802686d
-
SHA256
58aa3bcf3f48808cd1960f61f2f7c833812b8c7bc2c1444d08585c1f01afbd22
-
SHA512
0f424592f7b75306457e151aa0c0837182a21828339c1673dc41ff5c158f4a09fabac05d314d343ec134b15c08a60e008caa8b83894ee10d571c5d6264f218e7
-
SSDEEP
24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8auLIC64mpx/:4TvC/MTQYxsWR7ausCo
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.ivftech.cam - Port:
587 - Username:
[email protected] - Password:
Xb2CO@@htzx) - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2500 set thread context of 2080 2500 tmp.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 RegSvcs.exe 2080 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2500 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28 PID 2500 wrote to memory of 2080 2500 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-