Analysis
-
max time kernel
30s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 05:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
profoma invoice.exe
Resource
win7-20240419-en
windows7-x64
12 signatures
30 seconds
Behavioral task
behavioral2
Sample
profoma invoice.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
30 seconds
General
-
Target
profoma invoice.exe
-
Size
713KB
-
MD5
205115d53c09553975ebe093dac461b2
-
SHA1
e62dcafe6d96b592151c93b75544b3c211b238a6
-
SHA256
cbf14746622e54452570f3b6b620d0831c788c28c8bbb0a1f6cb17746e4973ef
-
SHA512
30ebce57a1ac51a4506e6fd2cba0e907738700d3670b07a9bc0510908b5aabdb0eb0fc08b1f0713f7dd0912d9284da94ec2979b4e22481eb720cb67a67f0f0e0
-
SSDEEP
12288:mTReLAfP7wDj3ZiCx2D3Flbl0VzyLqSjaKIYiYP7x31gCrRowa3LlGqbjGU9+yF:4537wDjUxlZ05yLDaKIfYP7RaCNuBGqN
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.ipr-co.org - Port:
587 - Username:
[email protected] - Password:
IPRco@100102@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
profoma invoice.exedescription pid process target process PID 332 set thread context of 2704 332 profoma invoice.exe profoma invoice.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
profoma invoice.exedescription pid process target process PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe PID 332 wrote to memory of 2704 332 profoma invoice.exe profoma invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\profoma invoice.exe"C:\Users\Admin\AppData\Local\Temp\profoma invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\Temp\profoma invoice.exe"C:\Users\Admin\AppData\Local\Temp\profoma invoice.exe"2⤵PID:2704
-