Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe
Resource
win10v2004-20240426-en
General
-
Target
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe
-
Size
1.2MB
-
MD5
9ef77cc57cbe09118edc18409769d299
-
SHA1
a71ac225e5811bc8a72298cf4f2981d10d7dc730
-
SHA256
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700
-
SHA512
c9cb9c026522037d9278afe1fe49f034b323feaa664ff691f8df63045a017f7a56cbca7b6bb35e61e23e1a3a7e56267fa4817ac6e8fb18c6243bffcd06d88cad
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aq7hR42K2BjNT8sjwNX:tTvC/MTQYxsWR7aq7hjDjl6
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4. 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables referencing Windows vault credential objects. Observed in infostealers 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables referencing many file transfer clients. Observed in information stealers 33 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-28-0x00000000031E0000-0x0000000003236000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-31-0x00000000057F0000-0x0000000005844000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-62-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-64-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-92-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-88-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-86-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-84-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-82-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-80-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-76-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-74-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-72-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-70-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-68-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-66-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-60-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-58-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-56-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-54-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-52-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-50-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-48-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-46-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-42-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-40-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-38-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-34-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-91-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-78-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-44-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-36-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/3776-33-0x00000000057F0000-0x000000000583E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exedescription pid process target process PID 4540 set thread context of 3776 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 3776 RegSvcs.exe 3776 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exec30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exepid process 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 3776 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exec30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exepid process 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exec30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exepid process 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exec30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exedescription pid process target process PID 2484 wrote to memory of 4080 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe PID 2484 wrote to memory of 4080 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe PID 2484 wrote to memory of 4080 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe PID 2484 wrote to memory of 4540 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe PID 2484 wrote to memory of 4540 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe PID 2484 wrote to memory of 4540 2484 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe PID 4540 wrote to memory of 3776 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe PID 4540 wrote to memory of 3776 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe PID 4540 wrote to memory of 3776 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe PID 4540 wrote to memory of 3776 4540 c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe"C:\Users\Admin\AppData\Local\Temp\c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe"2⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe"C:\Users\Admin\AppData\Local\Temp\c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\c30b63c938d5090eb132563774378154a0e97f2470f331e904fc023766dd2700.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD567097ecdd30506b77482463e58031d2d
SHA1ec9aeb40d44f77a2aca002a143831a11e8a496a7
SHA256a6ac05d2e6a3bb51568cbd9b17ffdbcb4f741155d3545a0bfc8c88f6ee2a280f
SHA512fbeb1e1fbd5726fa05b650a958609a41f6ecc45ca473b0b55c9b49578d2163b4c6a84e1ece21549b19162d1ce9ae0b43711b379c0f042056c7722e79e1302d5a
-
Filesize
29KB
MD53fc5266a1eed6ce8143dc3b73d50881f
SHA1d3c27e178f3a0fdc36b335ebfd1cb39f21922479
SHA256c9a6bf9dd8cb411fdc607b6b05ed8c893e437e55c53bab6a3eac13c792ebecc5
SHA51233b3253207d7267a51cdb857838caedc5b28b3e01688f1a2f25965cae4bcb6a01b4fb10a8568ad252466ff23fb0c5a0b6c2d724b9e94b773e47bafd4324417b2