Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
PI89454 007PT865.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PI89454 007PT865.exe
Resource
win10v2004-20240412-en
General
-
Target
PI89454 007PT865.exe
-
Size
774KB
-
MD5
3566c7155545174bef0308836ad16ada
-
SHA1
84950e601ef0e95ba6c98edee61d50a4354b2a7f
-
SHA256
9eb769fcd5d9616391c7ba5c4e029faed264b65e97e45589d0176ea544e2afc8
-
SHA512
7af6b984f95398c28d81a43483f6f44dee77e168cf06ed437d06a59ed482a6e6043101e51ce37d916f35911fbb1ba929b07b68b520d35a474a3311e5e725d862
-
SSDEEP
12288:GF2iNiQagXzGNvC1ODu2x+YINqlo+u7QL3GdekWNVn/dWgqc+clv312Z337:GF1LavkY62YYIkX3GddW/nq0J312ZL
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.klptruck.hu - Port:
21 - Username:
[email protected] - Password:
kCu}[Z7z+)S[
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
PI89454 007PT865.exepid process 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe 2896 PI89454 007PT865.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PI89454 007PT865.exedescription pid process Token: SeDebugPrivilege 2896 PI89454 007PT865.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2896-0-0x0000000000220000-0x00000000002E8000-memory.dmpFilesize
800KB
-
memory/2896-1-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB
-
memory/2896-2-0x0000000000470000-0x00000000004B0000-memory.dmpFilesize
256KB
-
memory/2896-3-0x00000000005C0000-0x00000000005E0000-memory.dmpFilesize
128KB
-
memory/2896-4-0x00000000005F0000-0x0000000000604000-memory.dmpFilesize
80KB
-
memory/2896-5-0x0000000001EC0000-0x0000000001F44000-memory.dmpFilesize
528KB
-
memory/2896-6-0x00000000047C0000-0x0000000004802000-memory.dmpFilesize
264KB
-
memory/2896-7-0x0000000074340000-0x0000000074A2E000-memory.dmpFilesize
6.9MB
-
memory/2896-8-0x0000000000470000-0x00000000004B0000-memory.dmpFilesize
256KB