Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
Resource
win10v2004-20240412-en
General
-
Target
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe
-
Size
1000KB
-
MD5
b83a6713728f46f6355c75d05bec7211
-
SHA1
a6d9a0f262596cc59b7e5c68743e766045a20fcf
-
SHA256
7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80
-
SHA512
95a141c20f7baf8fccf36c983cb126f80911b0fed89fff88ebafd3f0bf46e7b91bf177399815498b9b7445258a8efe150c6bd7e552070b1a62e6dd122439c1c8
-
SSDEEP
12288:dFY4NBNuZ0XXWm67PCXZIj5MFqyHivmRykwCck0p:U4NeeXYrCXZc4/2p
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.xpl.co.nz - Port:
587 - Username:
[email protected] - Password:
martin123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4468 set thread context of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 4676 MSBuild.exe 4676 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe Token: SeDebugPrivilege 4676 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4676 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91 PID 4468 wrote to memory of 4676 4468 7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe"C:\Users\Admin\AppData\Local\Temp\7845739be7bf4d602cbaa0f0a900bea3c631c439eb57fe53d92b3686c49c4b80.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4676
-