Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 01:26

General

  • Target

    ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c.exe

  • Size

    246KB

  • MD5

    bfb8a979efec55c75d1530702239d741

  • SHA1

    03d5f2fba57dd1b1507a16221aaf003fa0d548d4

  • SHA256

    ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c

  • SHA512

    591d7955eef3fd0e0d6642f531c6afa54df50a051b3cf232d225c69d9f1d4fce786e269da1a627a9e1a0b913a6c9579cba4be77f18b54241185d6e9d03954c75

  • SSDEEP

    3072:hy5n5JJJpurL4s5xMq6m62QUnW/2OuRx9g58j05OAix08SOXL:hyV5JJJp6L4s5uqU2zFOuu58jEim8

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    IDMzp2Gy8uh9

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c.exe
    "C:\Users\Admin\AppData\Local\Temp\ba7541211cc1c286dcdd1dfce89c9ed1827544bffcba2263270e461a45b00b2c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar27F2.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2348-0-0x000000007455E000-0x000000007455F000-memory.dmp

    Filesize

    4KB

  • memory/2348-1-0x0000000000BD0000-0x0000000000C14000-memory.dmp

    Filesize

    272KB

  • memory/2348-2-0x0000000074550000-0x0000000074C3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2348-42-0x000000007455E000-0x000000007455F000-memory.dmp

    Filesize

    4KB

  • memory/2348-43-0x0000000074550000-0x0000000074C3E000-memory.dmp

    Filesize

    6.9MB