Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 05:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3HFN3NatQcTex2p.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3HFN3NatQcTex2p.exe
Resource
win10v2004-20240419-en
5 signatures
150 seconds
General
-
Target
3HFN3NatQcTex2p.exe
-
Size
726KB
-
MD5
26edbc34e50837ed377c36cf8bb41420
-
SHA1
6b18423aafc1d84d8e9cfb6a372970b6188cc132
-
SHA256
653de864a7498c655f3a0c92d15be1f892651d8bcc3abad74465de5fe61356b5
-
SHA512
a33f9ac6aa534f9602868bd2ca633c66aee78daaf3afd349da5a3387d05ba97b703d9c3e32d21db41574a8799596a8d01f1a86dcf654741a14f559de8da8cf7f
-
SSDEEP
12288:nSXxD2iNx2V7H+oS/zOO91iJJhYG9wtYdIIPBV3IE4vT1PWIOztGeeWFm+Y39:nQ18ILOO91iPyA4Y2jvT8IOztGeRFm+Y
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.atarod.org.af - Port:
587 - Username:
[email protected] - Password:
A1tarod@23 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4652 set thread context of 1844 4652 3HFN3NatQcTex2p.exe 100 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 4652 3HFN3NatQcTex2p.exe 1844 MSBuild.exe 1844 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4652 3HFN3NatQcTex2p.exe Token: SeDebugPrivilege 1844 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100 PID 4652 wrote to memory of 1844 4652 3HFN3NatQcTex2p.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3HFN3NatQcTex2p.exe"C:\Users\Admin\AppData\Local\Temp\3HFN3NatQcTex2p.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-