Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
jrP1O57Izu07l0t.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
jrP1O57Izu07l0t.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
jrP1O57Izu07l0t.exe
-
Size
719KB
-
MD5
faab59c6da6c4e9a5d74ffd849f1ed91
-
SHA1
065293adb90f03c758908ba3e9bf6b3f72d02f5f
-
SHA256
87a21393ccd3a833e6b7481eaf2dd7f3889cafa097bfbf4e2c96160fbf12b265
-
SHA512
4e3a4d7df919b0aa86401f26c468623be22986f3668dd6a8501ac2a848246ff7d6e1c3e87034d734f1cb6f7e6ac94d2741f7d4bd8601e88e20889253c1f59c92
-
SSDEEP
12288:PdbZtdc5E2HyniuyPYVyOEbuCJ4vUzYeCDVoh+WboBQkx9qqoz8z9kByB:lFtdEYobxdj7B42y
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.atlantegypt.com - Port:
587 - Username:
[email protected] - Password:
OL11121314ol - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
jrP1O57Izu07l0t.exedescription pid process target process PID 3632 set thread context of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
jrP1O57Izu07l0t.exeMSBuild.exepid process 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 3632 jrP1O57Izu07l0t.exe 4280 MSBuild.exe 4280 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jrP1O57Izu07l0t.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 3632 jrP1O57Izu07l0t.exe Token: SeDebugPrivilege 4280 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
jrP1O57Izu07l0t.exedescription pid process target process PID 3632 wrote to memory of 452 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 452 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 452 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe PID 3632 wrote to memory of 4280 3632 jrP1O57Izu07l0t.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jrP1O57Izu07l0t.exe"C:\Users\Admin\AppData\Local\Temp\jrP1O57Izu07l0t.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-