Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe
-
Size
821KB
-
MD5
c7ae7bfda7f71b76c6f3213cfe94529e
-
SHA1
eebcb778056a8fa9a33255141d70ffac41523caf
-
SHA256
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4
-
SHA512
70326a8b9f6c7d99f82e32f0116b23e2b879bbea3235b03e7510a080ffbbeabc2620b09be4406a2a2b28b62c0679a3ee56e39b7398991693c80da0d84fe43fd2
-
SSDEEP
12288:8bBFvUojlMVWIhWL7Uc8Eh8xn8mWpXS0iNrmY:8bPvUohIWIhko9xnVWpCH
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6994888350:AAFqI19L4KkGo55n9P5XziXuBSULg-rdpEc/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 2 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exepid process 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 api.ipify.org 26 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exepid process 4892 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exepid process 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 4892 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exedescription pid process target process PID 3112 set thread context of 4892 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Drops file in Windows directory 1 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exedescription ioc process File opened for modification C:\Windows\Fonts\Apoplektikerens\Chateaubriand.Exi 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exepid process 4892 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 4892 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exepid process 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exedescription pid process Token: SeDebugPrivilege 4892 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exedescription pid process target process PID 3112 wrote to memory of 4892 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe PID 3112 wrote to memory of 4892 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe PID 3112 wrote to memory of 4892 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe PID 3112 wrote to memory of 4892 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe PID 3112 wrote to memory of 4892 3112 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe 93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe"C:\Users\Admin\AppData\Local\Temp\93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe"C:\Users\Admin\AppData\Local\Temp\93b75e7f99768d86cb26282a3164d806d36a2c890fb7d367f0cf389a75d304d4.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsh4BB5.tmpFilesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
C:\Users\Admin\AppData\Local\Temp\nsl4A48.tmpFilesize
65B
MD51bd5509d17a385dbcebec5b71de8dffc
SHA19d70c3f205dddda5e33e5de97c0a09feb6836130
SHA2562bad3065546719b1e5ff58cb7ca6231b6cb669fb1fd06fb30102e9df00d63e60
SHA512ca43f9d62ad2c3b950b816274869a1c0bd22b77bbb80fc810783ef23b9317362132fb2f29510bb51f4d00940d8c9038b5700560b6f1e38722b2e65037c148bbf
-
C:\Users\Admin\AppData\Local\Temp\nsl4A48.tmpFilesize
70B
MD5f603843c4b1146c576a2c9e0826de265
SHA15de71ba33c20cfb74c19c706a4a44706d78fb102
SHA256ada9d1ffc0e78d2e2c05290b4ba1b1b04bc9c97a8f8e084ae0d49e36a9bb9c0c
SHA5127a5a8ebc1c12193783ae711eb4716c1a2e52d1c4799dcd7f2a29924c246b1c665f456de3eaffd5e9cd7f42e788009e2798d1121c8d695698c86349bff17d5e8a
-
C:\Users\Admin\AppData\Local\Temp\nsl4A48.tmpFilesize
72B
MD5830f634fb44956d70a234c43be9c0b75
SHA11ebe612620e801a4db9256781c95048f7573edc7
SHA2562a404ae066022b1d313fc3fa263e53ba387aa301e650cbca6379847bb1417381
SHA5128aa1eeab0f139af87885916505c5dd56ba66771d2083da8d505878b09eaaff8b8c35d765a0770d4b7deca4414f9ae88070f91e9ba119c4dc9b44875bdd344132
-
C:\Users\Admin\AppData\Local\Temp\nsl4A48.tmpFilesize
14B
MD52f18f8f3b6d27674881e055d03e7e356
SHA17f6bb8aa1fa32dfb63b1da03d45c9aad694eeaf2
SHA2567a9d5de32c67cb645d31b7d278cee322b643f98342a2d3b350bef4477a806d1a
SHA5128d9ee0a92f9a0b15213eab47d1cab60258bf34b82664b4744e130d23a7a28d895c687322ae670d04168e3897f31da50999ea12a2c7f730d22be1fc363ef13631
-
C:\Users\Admin\AppData\Local\Temp\nsl4A48.tmpFilesize
37B
MD5c641bfa28a71f86301ed9e81931da24c
SHA159770ef0e9c2658e6aacd708615767660a2dec66
SHA256df9ef051e1940f576446c4ef6d4ee0f201488c4c0485c26ef2bd3923b3e6a761
SHA512e2e24f388600ca77ea717c8ebf382ff961cf20ae054d807526dddf28e5a328cbacfb57a6d00ad43afca0a4bc00ebb3f42a169de1fa5787265f468fe9056d093e
-
C:\Users\Admin\AppData\Local\Temp\nsm4A99.tmpFilesize
26B
MD5b7e56998ef81615a40866acb94c2f30a
SHA1205d7d70bb8077a220d58f0bea2975fef5acf95a
SHA2560b50a60cc7418cc1aec43be27dad966a1cf62eea10f825cb93d62b265c7e5dd7
SHA5124f8a5482c7a21fc0f33e7da187ba7e9ef1250729ec30e56cee98c86e96a5307387436639040905f88ac9af24117d8c8094d142a70c2144c5935b1ace877dd731
-
C:\Users\Admin\AppData\Local\Temp\nsm4A99.tmpFilesize
46B
MD50553e87a8f74189e757bfada8ab0ab9e
SHA1f4c99fe7e957926b88a46ae93d2f02b855f6d88f
SHA2562ccb8084cb357c920cad749dcb3a4c25339f530c9947dfc8e1f1d54cb7b0ce24
SHA5128df3168e8f53b40ddf4b2e83d4e3cad2c88edfb484292e263ee5264d7992af6f1aa8a3618f5e90a02082a3642a894bfae43853b35abaef833a8aa5b590fc70fc
-
C:\Users\Admin\AppData\Local\Temp\nsm4A99.tmpFilesize
49B
MD51aeb67240bc704bf6cc2fa0a6f52a970
SHA10d5cbc71d7e606e7f1a68332be8a7a5a7b4be02d
SHA256bbd283b5a658ac95e8811c820de41f911e7559e982d9378b5b14c3f7cb5ccb6d
SHA512c64bdb3c49ff5ca422fe5a4a03fac5145072f7cf692addc23e811ce39c25fc7fcb8e15a07fd770eb8d392d86cfc12c3520b080899a4d2c85646c09b181f2b47c
-
C:\Users\Admin\AppData\Local\Temp\nsm4A99.tmpFilesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
C:\Users\Admin\AppData\Local\Temp\nsr4B08.tmpFilesize
6B
MD550484c19f1afdaf3841a0d821ed393d2
SHA1c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA2566923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b
-
C:\Users\Admin\AppData\Local\Temp\nsr4B08.tmpFilesize
56B
MD5c599d20101d8532a39fefbec3a4162a9
SHA16215d1abf9002230448221e1ebdcb2916df29cb3
SHA256db2d57c0d52d8989de271b0b5440e043c7c93b4f58092de80a1c1e569f5327b2
SHA512df32094a64597c11d96b2844ea097c960cf39901508dcdf9d0892e2879706d2b6a178d1f798a1ba22613091c79b11ba468b21ad04f7856c8be3cfd517330df93
-
C:\Users\Admin\AppData\Local\Temp\nsw4A88.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nsw4AD8.tmpFilesize
5B
MD5e2fecc970546c3418917879fe354826c
SHA163f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA5123c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a
-
C:\Users\Admin\AppData\Local\Temp\nsw4AD8.tmpFilesize
12B
MD5558ec0e73952eb4a395e7f17eb69221e
SHA1d1cb97bfc8d9fad9eab7d19e685029b5f7084709
SHA2564d8a1cb0f83d824cec9e15e4d45605ed2cc92ae959602d0cc8873b0125d4cd74
SHA512698fb90fadb2b22ce78f874dac04c2f0bf72340d39f135e7736afdb9a9b28c9c55a8c6c9f871676134e6d057a90afc2944d1f1e8a117cc0f7a90c8d9b60c5dbe
-
C:\Users\Admin\AppData\Local\Temp\nsw4AD8.tmpFilesize
60B
MD52d45b071bce5847e12b6308c981e1ab7
SHA15bc8e983895acd8ed0d5bb4fc48355cf5871ed2c
SHA2563e9039677f7626a652276f60ecb67b20cd004050af6d7cec32d237591254cb81
SHA512e838c8c079a8ca453eaa5509df7fe8340329afbf6e6205938ebcac23a98514b7465e8ab7cc9e1be1af10423ab87c8f1797013b58dffcc3d29a35a792d8f05ebc
-
memory/3112-575-0x00000000779F1000-0x0000000077B11000-memory.dmpFilesize
1.1MB
-
memory/3112-576-0x0000000074855000-0x0000000074856000-memory.dmpFilesize
4KB
-
memory/4892-577-0x0000000077A78000-0x0000000077A79000-memory.dmpFilesize
4KB
-
memory/4892-578-0x0000000077A95000-0x0000000077A96000-memory.dmpFilesize
4KB
-
memory/4892-580-0x00000000779F1000-0x0000000077B11000-memory.dmpFilesize
1.1MB
-
memory/4892-579-0x00000000004C0000-0x0000000001714000-memory.dmpFilesize
18.3MB
-
memory/4892-581-0x000000007221E000-0x000000007221F000-memory.dmpFilesize
4KB
-
memory/4892-582-0x00000000004C0000-0x0000000000502000-memory.dmpFilesize
264KB
-
memory/4892-583-0x0000000038280000-0x0000000038824000-memory.dmpFilesize
5.6MB
-
memory/4892-584-0x0000000035F70000-0x0000000035FD6000-memory.dmpFilesize
408KB
-
memory/4892-585-0x0000000072210000-0x00000000729C0000-memory.dmpFilesize
7.7MB
-
memory/4892-586-0x00000000390C0000-0x0000000039110000-memory.dmpFilesize
320KB
-
memory/4892-587-0x0000000039110000-0x00000000391A2000-memory.dmpFilesize
584KB
-
memory/4892-588-0x00000000391E0000-0x00000000391EA000-memory.dmpFilesize
40KB
-
memory/4892-591-0x000000007221E000-0x000000007221F000-memory.dmpFilesize
4KB
-
memory/4892-592-0x0000000072210000-0x00000000729C0000-memory.dmpFilesize
7.7MB