Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
INV0029382.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
INV0029382.exe
Resource
win10v2004-20240226-en
General
-
Target
INV0029382.exe
-
Size
997KB
-
MD5
c72150696ac13ac1a2dc8b492c0d5ca3
-
SHA1
ff72cd015ebfe11c15f331122103fb78c5ad118c
-
SHA256
1429363a609282393015df73bb88aea33d19637a0abb82982d1050e56e1b4481
-
SHA512
505dd2c31c2f4e08330239d1a7c4357df8fd1c8aa66a50b5a4e91162b7c800caefb56eef69aa6c66955382a91fcb2997f269eaf280826e647a9491a2f9741c1f
-
SSDEEP
24576:gsP3GbkmtYXd/f9j91ir4hpKyO7YL3qiA8b2ab6WzXQ9DwYE:gf2Xrj9Qru/kaqFabBQ9sb
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7017233680:AAEfWTUjfiK5hxLLRkmgitv57SQZuFap4nQ/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
INV0029382.exedescription pid process target process PID 3152 set thread context of 4080 3152 INV0029382.exe regsvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvcs.exepid process 4080 regsvcs.exe 4080 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
regsvcs.exedescription pid process Token: SeDebugPrivilege 4080 regsvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
INV0029382.exedescription pid process target process PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe PID 3152 wrote to memory of 4080 3152 INV0029382.exe regsvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV0029382.exe"C:\Users\Admin\AppData\Local\Temp\INV0029382.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3152-6-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmpFilesize
10.8MB
-
memory/3152-1-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmpFilesize
10.8MB
-
memory/3152-2-0x000001295C010000-0x000001295C020000-memory.dmpFilesize
64KB
-
memory/3152-3-0x0000012974750000-0x00000129747E6000-memory.dmpFilesize
600KB
-
memory/3152-0-0x000001295A2F0000-0x000001295A35C000-memory.dmpFilesize
432KB
-
memory/4080-8-0x0000000002C30000-0x0000000002C40000-memory.dmpFilesize
64KB
-
memory/4080-5-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/4080-7-0x0000000005780000-0x0000000005D24000-memory.dmpFilesize
5.6MB
-
memory/4080-4-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/4080-9-0x0000000005240000-0x00000000052A6000-memory.dmpFilesize
408KB
-
memory/4080-10-0x0000000005F90000-0x0000000005FE0000-memory.dmpFilesize
320KB
-
memory/4080-11-0x0000000006080000-0x0000000006112000-memory.dmpFilesize
584KB
-
memory/4080-12-0x0000000006010000-0x000000000601A000-memory.dmpFilesize
40KB
-
memory/4080-13-0x0000000074FA0000-0x0000000075750000-memory.dmpFilesize
7.7MB
-
memory/4080-14-0x0000000002C30000-0x0000000002C40000-memory.dmpFilesize
64KB