Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
FedEx DOC_773690995161.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
FedEx DOC_773690995161.exe
Resource
win10v2004-20240419-en
General
-
Target
FedEx DOC_773690995161.exe
-
Size
725KB
-
MD5
741038ed4e399dd43401cd0d932cbe28
-
SHA1
78a1e942ab1e2ab8b72943822d0d315a61f79b4a
-
SHA256
0d0ad0b643823f666030579fc18c8f4bca63e0012db299ea5cb51d05da892b83
-
SHA512
519825e1a02315c66013998f131121a9070f071e341ac7854867d10697eb20ab5840f57410c90b5701907867c9b69097d825ffed7e3a431948493c28ba46ae92
-
SSDEEP
12288:IxN592u+gIHlMtlt0lY6NcC9LkldYqKm0ESMIWzCbiYmGvgX5roviA22H96lPkR:IxN5guAFMtl+lYUk7Yq90LMTciYmogXG
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.metalsbox.com - Port:
587 - Username:
[email protected] - Password:
zxcA@@258963 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 2464 2248 FedEx DOC_773690995161.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2464 FedEx DOC_773690995161.exe 2464 FedEx DOC_773690995161.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2464 FedEx DOC_773690995161.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 FedEx DOC_773690995161.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28 PID 2248 wrote to memory of 2464 2248 FedEx DOC_773690995161.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\FedEx DOC_773690995161.exe"C:\Users\Admin\AppData\Local\Temp\FedEx DOC_773690995161.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\FedEx DOC_773690995161.exe"C:\Users\Admin\AppData\Local\Temp\FedEx DOC_773690995161.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2464
-