Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 01:01

General

  • Target

    55babb580500c46717c9b5798e6c098bb6e6decc37a8c9b38dd0164cfb50e6a0.exe

  • Size

    224KB

  • MD5

    f6c09cd9a367fbf59f50c41e6c0cd290

  • SHA1

    0aa28edc6eddce4decda784798968a835fb4f6f9

  • SHA256

    55babb580500c46717c9b5798e6c098bb6e6decc37a8c9b38dd0164cfb50e6a0

  • SHA512

    4b29b6cdada1167e567080abf53668a207449562a76fc5acc8c41e57911e2e3e4b42fb782e06039295edf7a65b51974b8ae239c6ebc9913665b9e5b38fedb66d

  • SSDEEP

    6144:oKaDj9fYeH6xzMiriMTr1Us7nRWHTZw/re1TiXwbZ8:EpAeH6xzMiriMTr1U4nQzZw/STU

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6981023497:AAHl8hNT6c3ywQtrLSswit8gBAF4M9xCAZU/

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\55babb580500c46717c9b5798e6c098bb6e6decc37a8c9b38dd0164cfb50e6a0.exe
    "C:\Users\Admin\AppData\Local\Temp\55babb580500c46717c9b5798e6c098bb6e6decc37a8c9b38dd0164cfb50e6a0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4076-0-0x0000000000210000-0x000000000024E000-memory.dmp

    Filesize

    248KB

  • memory/4076-1-0x0000000074C10000-0x00000000753C0000-memory.dmp

    Filesize

    7.7MB

  • memory/4076-2-0x0000000005250000-0x00000000057F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4076-3-0x0000000004C10000-0x0000000004C76000-memory.dmp

    Filesize

    408KB

  • memory/4076-4-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4076-5-0x0000000005B80000-0x0000000005BD0000-memory.dmp

    Filesize

    320KB

  • memory/4076-6-0x0000000005C70000-0x0000000005D0C000-memory.dmp

    Filesize

    624KB

  • memory/4076-7-0x00000000066B0000-0x0000000006742000-memory.dmp

    Filesize

    584KB

  • memory/4076-8-0x0000000006670000-0x000000000667A000-memory.dmp

    Filesize

    40KB

  • memory/4076-9-0x0000000074C10000-0x00000000753C0000-memory.dmp

    Filesize

    7.7MB

  • memory/4076-10-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB