Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe
Resource
win10v2004-20240508-en
General
-
Target
33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe
-
Size
1.5MB
-
MD5
7eedf337a5824379df84a628b5ad12ba
-
SHA1
e1bbded53262161ce93bd08181ded39c29e7a1e2
-
SHA256
33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf
-
SHA512
e5182418670c6803d75d9caa41fc1493a5efcd381f088d21955e795f0f9d37c22774d9258e08a973db94323a73848f08b8c3e40c31cfc9f6fd1705ada1945f43
-
SSDEEP
24576:CSFHypJqTSpfw3wr9KQdeqJjeAci5wr/hTy3xJVt96qjUXAay/T:qheAtQpTy3zfHUXc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
terminal4.veeblehosting.com - Port:
587 - Username:
[email protected] - Password:
Ifeanyi1987@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exedescription pid process target process PID 2152 set thread context of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvcs.exepid process 300 regsvcs.exe 300 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
regsvcs.exedescription pid process Token: SeDebugPrivilege 300 regsvcs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exedescription pid process target process PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 300 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe regsvcs.exe PID 2152 wrote to memory of 2548 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe WerFault.exe PID 2152 wrote to memory of 2548 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe WerFault.exe PID 2152 wrote to memory of 2548 2152 33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe"C:\Users\Admin\AppData\Local\Temp\33cb5eeb9b42bd08e6a3b13e3c4e7bbcdb02bdb2e071553f177d4e2f66f3b9bf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2152 -s 6242⤵PID:2548
-