Analysis

  • max time kernel
    122s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 22:11

General

  • Target

    Account _Editor.exe

  • Size

    1.3MB

  • MD5

    008ebc6333203e648958d4fd2382aee1

  • SHA1

    3115d9a665073984de8b2dc4a963cc3e784a73bb

  • SHA256

    88b3abbfca580a41a129719656faa22e308f492fb414ebef878533dc643757fc

  • SHA512

    c60158987dfb18e53d6e53bce8c18689ba7e0fec7d9f7a74e335e36a8ff0e007c4acd481862882cd920496b0fd1b82e1ff692fd7c4629de21ef5fd30a64a3e15

  • SSDEEP

    24576:9xDVAu0gy5oaV/lEVSL24t4rmbe3Bw5m9YvUkqjVnlqud+/2P+AJcdyFoBkkAne:9xDGu0gymI6kL14rmbCmU8UkqXfd+/9B

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Account _Editor.exe
    "C:\Users\Admin\AppData\Local\Temp\Account _Editor.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:624

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/624-0-0x000007FEF5633000-0x000007FEF5634000-memory.dmp
    Filesize

    4KB

  • memory/624-1-0x0000000000050000-0x00000000001A2000-memory.dmp
    Filesize

    1.3MB

  • memory/624-2-0x000000001C710000-0x000000001C906000-memory.dmp
    Filesize

    2.0MB

  • memory/624-3-0x000007FEF5630000-0x000007FEF601C000-memory.dmp
    Filesize

    9.9MB

  • memory/624-4-0x000007FEF5633000-0x000007FEF5634000-memory.dmp
    Filesize

    4KB

  • memory/624-5-0x000007FEF5630000-0x000007FEF601C000-memory.dmp
    Filesize

    9.9MB

  • memory/624-6-0x000000001CB40000-0x000000001CB50000-memory.dmp
    Filesize

    64KB