Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe
Resource
win10v2004-20240226-en
General
-
Target
99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe
-
Size
614KB
-
MD5
e31742e177ab89c57261b8464217d459
-
SHA1
4003f294d2349b2116557d467f4e336b72088513
-
SHA256
99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670
-
SHA512
cf3a3e6c924eb8963edc1fbea8da2a77f96df689674286ab1ca52216ce76fbc7b0c65db7e0a7c1ced2bdbaf69f2d60f0e72200d2c4a190c61e71bae23bbe2d68
-
SSDEEP
12288:w7WkQKwUSac4kYKS6q0GENi2TCMx03MBuZuZJ6Ov6uGkBBz037lyrBSjKZmEYt:w7dJwUSKFKS6qcNFGucsuMJ6Ov6Mp03l
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
terminal4.veeblehosting.com - Port:
587 - Username:
[email protected] - Password:
Ifeanyi1987@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 2212 jsc.exe 2212 jsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe Token: SeDebugPrivilege 2212 jsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2212 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 28 PID 2380 wrote to memory of 2852 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 29 PID 2380 wrote to memory of 2852 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 29 PID 2380 wrote to memory of 2852 2380 99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe"C:\Users\Admin\AppData\Local\Temp\99cfd5ce295586761fd7188ce635b5768fd546b959e12769099645a32dcc9670.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2380 -s 7402⤵PID:2852
-