Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
c45c19b5790cf57045ce3f8222c412f2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c45c19b5790cf57045ce3f8222c412f2.exe
Resource
win10v2004-20240226-en
General
-
Target
c45c19b5790cf57045ce3f8222c412f2.exe
-
Size
643KB
-
MD5
c45c19b5790cf57045ce3f8222c412f2
-
SHA1
818996bc52b3ff2d17620bb8d4902d80e7643ab6
-
SHA256
206b4b5ab8a00697a7161de7822d5235e4f9d913e57e503673cc0437c2ddceb0
-
SHA512
b87a5db0dbc25ff7b9331598607f6bca602e8167cb002adfd123d541665ff7c8fd0b88a68a990f33e3f28926b7bb2918e4054d6c1924a2eb0b42788d4e588107
-
SSDEEP
12288:wY5qjl5sV3opXxW603Hioen6ZH6i4bgc6ZLXgf4Kx6IF0TGLqk98h:wY5mvXUH30n656iXD6GIFlrO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gosportz.in - Port:
587 - Username:
sales@gosportz.in - Password:
Ss@gosportz - Email To:
cintronp44@yandex.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 api.ipify.org 13 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c45c19b5790cf57045ce3f8222c412f2.exedescription pid process target process PID 4524 set thread context of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msbuild.exepid process 1108 msbuild.exe 1108 msbuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
msbuild.exedescription pid process Token: SeDebugPrivilege 1108 msbuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msbuild.exepid process 1108 msbuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c45c19b5790cf57045ce3f8222c412f2.exedescription pid process target process PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe PID 4524 wrote to memory of 1108 4524 c45c19b5790cf57045ce3f8222c412f2.exe msbuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45c19b5790cf57045ce3f8222c412f2.exe"C:\Users\Admin\AppData\Local\Temp\c45c19b5790cf57045ce3f8222c412f2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1108-10-0x0000000006EA0000-0x0000000006EF0000-memory.dmpFilesize
320KB
-
memory/1108-14-0x00000000059A0000-0x00000000059B0000-memory.dmpFilesize
64KB
-
memory/1108-13-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/1108-12-0x0000000007120000-0x000000000712A000-memory.dmpFilesize
40KB
-
memory/1108-4-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/1108-5-0x00000000750A0000-0x0000000075850000-memory.dmpFilesize
7.7MB
-
memory/1108-6-0x0000000006000000-0x00000000065A4000-memory.dmpFilesize
5.6MB
-
memory/1108-7-0x00000000059A0000-0x00000000059B0000-memory.dmpFilesize
64KB
-
memory/1108-8-0x0000000005930000-0x0000000005996000-memory.dmpFilesize
408KB
-
memory/1108-11-0x0000000006F90000-0x0000000007022000-memory.dmpFilesize
584KB
-
memory/4524-3-0x000002ADFC750000-0x000002ADFC7E6000-memory.dmpFilesize
600KB
-
memory/4524-9-0x00007FFCA6D00000-0x00007FFCA77C1000-memory.dmpFilesize
10.8MB
-
memory/4524-0-0x000002ADF97E0000-0x000002ADF97F2000-memory.dmpFilesize
72KB
-
memory/4524-2-0x000002ADF9C20000-0x000002ADF9C30000-memory.dmpFilesize
64KB
-
memory/4524-1-0x00007FFCA6D00000-0x00007FFCA77C1000-memory.dmpFilesize
10.8MB