Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe
Resource
win10v2004-20240426-en
General
-
Target
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe
-
Size
985KB
-
MD5
be01442829f00cf449711150b1a189f0
-
SHA1
8f7e507c41b88d8c50cba9c155ecf60376ecdafd
-
SHA256
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5
-
SHA512
34003aa10cb934d7a7d7e8af979949e8b5d92c04a18dbbcc763595ee59daf8822d7d2b7a335b9ff1c2d2cf80d529339755c112e8a932eff170edde8c28b0f8ee
-
SSDEEP
12288:un6F4X56OWFTTbgCOV4GVSuxYJGZRJoZC2qRsB:une4JfsvgCsXVh2SZR
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hotelroyal.com.pl - Port:
587 - Username:
[email protected] - Password:
W0xw6jA.Hdr3 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
InstallUtil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gDoMsmy = "C:\\Users\\Admin\\AppData\\Roaming\\gDoMsmy\\gDoMsmy.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exedescription pid process target process PID 1384 set thread context of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exeInstallUtil.exepid process 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe 2936 InstallUtil.exe 2936 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe Token: SeDebugPrivilege 2936 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exedescription pid process target process PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe PID 1384 wrote to memory of 2936 1384 50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe"C:\Users\Admin\AppData\Local\Temp\50cd8f4cb01872b0bfe50b281adc591708ea17b3ac4fa7ac1110edbb7e669ef5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936