Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe
Resource
win10v2004-20240412-en
General
-
Target
117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe
-
Size
669KB
-
MD5
12667b7d8a6dcfff1a0c43a750988d62
-
SHA1
3999d635d964a007dca32ecd517601dff364655a
-
SHA256
117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825
-
SHA512
d96c5f368db96f5ec854a26beb2d94e08396598812e9bc85d15283804116c932d7e1d9dfa5d52ec556cb17d1b08c74ff390f4c6cf54f76709f80ace6ba19f52b
-
SSDEEP
12288:RjDIEiop/8un4oTX9afMuPr+aCosGhgYQZh3cKsWWT:FJ5pNl9puPrnsG7insWW
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.indra-precision.co.th - Port:
21 - Username:
[email protected] - Password:
UW8f$y[fBOEs
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe"C:\Users\Admin\AppData\Local\Temp\117c8a7e6072078e29744cee8b95f1fe401077d52750c4325340dd2ce9b92825.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704