Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
Advice Ref A231k6Q1L2GQ.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Advice Ref A231k6Q1L2GQ.exe
Resource
win10v2004-20240426-en
General
-
Target
Advice Ref A231k6Q1L2GQ.exe
-
Size
355KB
-
MD5
260d4fd1fd35318223e403e6496f9bc2
-
SHA1
ed7ff6c5a90f7e8a629ea80d8e2087d3764e789f
-
SHA256
7ceeccc9ac21edf08e890d984d4755d093253dad8f45b42c9989983101aea498
-
SHA512
f41eaa8a37237adaa8720117b74da8bf6be26c6dab9cfce215b15960dd288cf9ab02442dda5cf5b19ad2522ac1adf641aa09061aa0a902d52d093819683ec573
-
SSDEEP
6144:Jp/py1PxVWKMr6RxyzggjR0nekAakuvhzo/cu3HzhVKuqtxBHGIGvr:rE1Px4/r68jR0nLVkuvcHzL5qlGI+r
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6240128422:AAF92bsfXTRwFqVrbwbkd53IuHO7T3W8CXQ/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 api.ipify.org 14 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 620 set thread context of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4148 Advice Ref A231k6Q1L2GQ.exe 4148 Advice Ref A231k6Q1L2GQ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4148 Advice Ref A231k6Q1L2GQ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4148 Advice Ref A231k6Q1L2GQ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81 PID 620 wrote to memory of 4148 620 Advice Ref A231k6Q1L2GQ.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Advice Ref A231k6Q1L2GQ.exe"C:\Users\Admin\AppData\Local\Temp\Advice Ref A231k6Q1L2GQ.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Advice Ref A231k6Q1L2GQ.exe"C:\Users\Admin\AppData\Local\Temp\Advice Ref A231k6Q1L2GQ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4148
-