Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 01:45

General

  • Target

    f3cc6d8e480b37ed6a8b537fc96e447537321f3edf13d38bf2590e4c1312cf5e.exe

  • Size

    803KB

  • MD5

    829eb330a0bf4f36e9fc7170bc2c979d

  • SHA1

    f843ab060f72ea51dc60b5e676bb74dfbbd31224

  • SHA256

    f3cc6d8e480b37ed6a8b537fc96e447537321f3edf13d38bf2590e4c1312cf5e

  • SHA512

    dc3e1c538cf2932154d37b38e683f893a13f403c466922357a3e3ee8b1900955162a1a90b9d3f2514976c4908146ee3062d64e3bb193754eb410132f58f16a40

  • SSDEEP

    12288:0T/cWcg3c+0cEuYctcycQSYcPPam4FQh3cRAR380HZD7mFF4aibXhh/GX/TVM1Ui:0T+5D7kF4nhYkcvbZG59cc

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ariamobaddel.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    P@ssw0rd1000

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3cc6d8e480b37ed6a8b537fc96e447537321f3edf13d38bf2590e4c1312cf5e.exe
    "C:\Users\Admin\AppData\Local\Temp\f3cc6d8e480b37ed6a8b537fc96e447537321f3edf13d38bf2590e4c1312cf5e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2324-11-0x0000000006DD0000-0x0000000006E20000-memory.dmp
    Filesize

    320KB

  • memory/2324-8-0x0000000005750000-0x00000000057B6000-memory.dmp
    Filesize

    408KB

  • memory/2324-16-0x00000000056D0000-0x00000000056E0000-memory.dmp
    Filesize

    64KB

  • memory/2324-3-0x0000000000400000-0x0000000000476000-memory.dmp
    Filesize

    472KB

  • memory/2324-4-0x0000000075010000-0x00000000757C0000-memory.dmp
    Filesize

    7.7MB

  • memory/2324-5-0x0000000005AF0000-0x0000000006094000-memory.dmp
    Filesize

    5.6MB

  • memory/2324-15-0x0000000075010000-0x00000000757C0000-memory.dmp
    Filesize

    7.7MB

  • memory/2324-7-0x00000000056D0000-0x00000000056E0000-memory.dmp
    Filesize

    64KB

  • memory/2324-14-0x00000000073D0000-0x00000000073DA000-memory.dmp
    Filesize

    40KB

  • memory/2324-13-0x0000000007240000-0x00000000072D2000-memory.dmp
    Filesize

    584KB

  • memory/2324-12-0x0000000006EC0000-0x0000000006F5C000-memory.dmp
    Filesize

    624KB

  • memory/2740-0-0x0000028562290000-0x000002856235C000-memory.dmp
    Filesize

    816KB

  • memory/2740-6-0x00007FFAB5970000-0x00007FFAB6431000-memory.dmp
    Filesize

    10.8MB

  • memory/2740-1-0x00007FFAB5970000-0x00007FFAB6431000-memory.dmp
    Filesize

    10.8MB

  • memory/2740-2-0x000002857CA30000-0x000002857CA40000-memory.dmp
    Filesize

    64KB