Analysis

  • max time kernel
    62s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 12:16

General

  • Target

    ghVYKlWkRxFNuDb.exe

  • Size

    650KB

  • MD5

    a054288c62a8c96b4393e0d7616a3d6b

  • SHA1

    79cb13055b7831afc39dd91ec5b32205b962b2e8

  • SHA256

    837c9f462983fee07c9648d487f7ff5e1ec82c9b45d0ae9337f8c452cd0e6b5c

  • SHA512

    d01d8a717ce768a2de35a9e40e568d084bb4f0472eab9e2975ed6d161c0a276804e15f219d3deb1cca5fe341541e57cc17395d45dc28a16eed47c7c31d993e63

  • SSDEEP

    12288:EaAv6zT370OC2qoICt4VhTYFGf4KGrV0nQQCqqWLz1HL9wtT5wjBMOioRw4RjR90:6PlsMTYF+ZnwWR9wtT5wjlwwP

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ghVYKlWkRxFNuDb.exe
    "C:\Users\Admin\AppData\Local\Temp\ghVYKlWkRxFNuDb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:4800
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1496-13-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/1496-21-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/1496-20-0x0000000074C00000-0x00000000753B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1496-19-0x0000000006150000-0x00000000061A0000-memory.dmp

      Filesize

      320KB

    • memory/1496-17-0x0000000005260000-0x00000000052C6000-memory.dmp

      Filesize

      408KB

    • memory/1496-16-0x00000000051E0000-0x00000000051F0000-memory.dmp

      Filesize

      64KB

    • memory/1496-15-0x0000000074C00000-0x00000000753B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4560-5-0x0000000005680000-0x000000000568A000-memory.dmp

      Filesize

      40KB

    • memory/4560-6-0x0000000005A00000-0x0000000005A12000-memory.dmp

      Filesize

      72KB

    • memory/4560-9-0x00000000068A0000-0x0000000006922000-memory.dmp

      Filesize

      520KB

    • memory/4560-10-0x000000000A730000-0x000000000A7CC000-memory.dmp

      Filesize

      624KB

    • memory/4560-11-0x0000000074C00000-0x00000000753B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4560-12-0x0000000005880000-0x0000000005890000-memory.dmp

      Filesize

      64KB

    • memory/4560-7-0x0000000005A50000-0x0000000005A58000-memory.dmp

      Filesize

      32KB

    • memory/4560-8-0x0000000005B70000-0x0000000005B7C000-memory.dmp

      Filesize

      48KB

    • memory/4560-0-0x0000000000BD0000-0x0000000000C78000-memory.dmp

      Filesize

      672KB

    • memory/4560-4-0x0000000005880000-0x0000000005890000-memory.dmp

      Filesize

      64KB

    • memory/4560-18-0x0000000074C00000-0x00000000753B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4560-3-0x00000000056B0000-0x0000000005742000-memory.dmp

      Filesize

      584KB

    • memory/4560-2-0x0000000005BC0000-0x0000000006164000-memory.dmp

      Filesize

      5.6MB

    • memory/4560-1-0x0000000074C00000-0x00000000753B0000-memory.dmp

      Filesize

      7.7MB