Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe
Resource
win10v2004-20240412-en
General
-
Target
FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe
-
Size
343KB
-
MD5
c76efdb4e5635149c1b497d97a4f6705
-
SHA1
ae650c66fbd30e7b2f82e00b05f144327855a242
-
SHA256
8c25cf13e11a0e70496fd6b29c06791d67e88fac769bbc01b246f6b9185d01ec
-
SHA512
449015833804ab73f3ec1a31b6398ee5e732ca2130a2a3478fc3a04d1472a070e8adf1c2416889a6696814d46078946a95677bdb596e974a1a32d4bb48006a8f
-
SSDEEP
6144:zQYp57TecLU2TK+yo8wtWrC9XhRNnDRW5fZiIjQmlLE5AtWY1ef+Cs:V7acU2eFo8wgWxRnlW5YVmlLXrd
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1229525528889786609/tOVMO5Z_M4BA48Kk7Vwyiyo80wiXk4VHzcMKDBdjj1I0tjfpqTfl5EWKQHiVRMHeN6XR
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NewApp = "C:\\Users\\Admin\\AppData\\Roaming\\NewApp\\NewApp.exe" FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 api.ipify.org 38 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1988 set thread context of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3244 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 3244 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3244 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3244 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90 PID 1988 wrote to memory of 3244 1988 FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe"C:\Users\Admin\AppData\Local\Temp\FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe"C:\Users\Admin\AppData\Local\Temp\FACTURA DE CRÉDITO E_Ecr_000800000108 (1)..exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3244
-