Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 01:05

General

  • Target

    7acef23a2cc5fbb91aa548e131802502500f2d380c873c2cdfc4d4f275afd683.exe

  • Size

    233KB

  • MD5

    375e3ad35394eb1ed8d96fc72d1dfb7a

  • SHA1

    97b4c19aa498b6d6f0e243207648bd2a864b7bf8

  • SHA256

    7acef23a2cc5fbb91aa548e131802502500f2d380c873c2cdfc4d4f275afd683

  • SHA512

    733b07b1fd87795e5726942464ce2dd88337f489a977960668cb0f8bcdc94bf2f93092b710e340a5d2002000c405e92fcdb40758146c06d55e80a26c409f28fa

  • SSDEEP

    3072:QJVQ0w8gUnhACBcHLG8hYFv3HrV1FEA595E//p+k:WVQ0w8gUuCBsLGzFvr6KE3Mk

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    inhanoi.net.vn
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ^TSt3!FK$UBA

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://inhanoi.net.vn
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ^TSt3!FK$UBA

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\7acef23a2cc5fbb91aa548e131802502500f2d380c873c2cdfc4d4f275afd683.exe
    "C:\Users\Admin\AppData\Local\Temp\7acef23a2cc5fbb91aa548e131802502500f2d380c873c2cdfc4d4f275afd683.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3984-0-0x0000000074430000-0x0000000074BE0000-memory.dmp

          Filesize

          7.7MB

        • memory/3984-1-0x0000000000AC0000-0x0000000000B00000-memory.dmp

          Filesize

          256KB

        • memory/3984-2-0x0000000005B00000-0x00000000060A4000-memory.dmp

          Filesize

          5.6MB

        • memory/3984-3-0x0000000005650000-0x00000000056B6000-memory.dmp

          Filesize

          408KB

        • memory/3984-4-0x0000000005540000-0x0000000005550000-memory.dmp

          Filesize

          64KB

        • memory/3984-5-0x0000000006CC0000-0x0000000006D10000-memory.dmp

          Filesize

          320KB

        • memory/3984-6-0x0000000006DB0000-0x0000000006E4C000-memory.dmp

          Filesize

          624KB

        • memory/3984-7-0x0000000006EF0000-0x0000000006F82000-memory.dmp

          Filesize

          584KB

        • memory/3984-8-0x0000000006E60000-0x0000000006E6A000-memory.dmp

          Filesize

          40KB

        • memory/3984-9-0x0000000074430000-0x0000000074BE0000-memory.dmp

          Filesize

          7.7MB

        • memory/3984-10-0x0000000005540000-0x0000000005550000-memory.dmp

          Filesize

          64KB