Analysis
-
max time kernel
112s -
max time network
113s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
naredbe_br-_700611_-_C.E.F_doo.exe
Resource
win11-20240221-en
General
-
Target
naredbe_br-_700611_-_C.E.F_doo.exe
-
Size
378KB
-
MD5
664c37187584a8e1166b7b165604c983
-
SHA1
9d220fa1faae9a4189a577cb83fad805aac6f2da
-
SHA256
f4da57d0555605c326f7b9b5b5277a444216638d524aabb4ef28d71da82d7907
-
SHA512
9daf4b2641cd252f87b254a8960300f603d9174c3dc21a9fc47d7e37be5590aa5681cd44778d07a63309c2c928725ee39c935ca1892c8af9a8d8c6caf9ae5515
-
SSDEEP
6144:ESTs6CT2GhNHYPkUlBDpgYmYHtu2gECB5R7gymxh8dk60iT4McP7ZPmT3D6J96sQ:ESTa2iNHYsUlppAYNEECB5mgTUMM7ZP+
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 580 naredbe_br-_700611_-_C.E.F_doo.exe 580 naredbe_br-_700611_-_C.E.F_doo.exe 580 naredbe_br-_700611_-_C.E.F_doo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 580 naredbe_br-_700611_-_C.E.F_doo.exe Token: SeDebugPrivilege 580 naredbe_br-_700611_-_C.E.F_doo.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1876 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\naredbe_br-_700611_-_C.E.F_doo.exe"C:\Users\Admin\AppData\Local\Temp\naredbe_br-_700611_-_C.E.F_doo.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:580
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2984
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:1876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82