Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 10:38

General

  • Target

    101764ZAM2024.exe

  • Size

    235KB

  • MD5

    0d86f78e0890d8354c0a699d455d40a5

  • SHA1

    65ef0598861717cd5388c7cd727369ba37474e91

  • SHA256

    700a3f6f385fa35265fce9d83c27eaa36c342cfe3561b5ddfbd484d526fa9c67

  • SHA512

    9619e022530bd8d272f4afb70071d7daadec097bfea2d25834c9bdd01bbcb5fe5b794fd07d7e62e4bde3a6d8afceb4739491573b4808461bb0dcb678381383ff

  • SSDEEP

    3072:WK78YEY/UE6gBDTt/ZL5hPUJkkxRd85N6GofVkj+:/78YEY/UE6gl79pqZrdpGo9

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.hotelroyal.com.pl
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    W0xw6jA.Hdr3

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\101764ZAM2024.exe
    "C:\Users\Admin\AppData\Local\Temp\101764ZAM2024.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2440-0-0x00000000747FE000-0x00000000747FF000-memory.dmp

    Filesize

    4KB

  • memory/2440-1-0x0000000000FE0000-0x0000000001022000-memory.dmp

    Filesize

    264KB

  • memory/2440-2-0x00000000060B0000-0x0000000006654000-memory.dmp

    Filesize

    5.6MB

  • memory/2440-3-0x0000000005B70000-0x0000000005BD6000-memory.dmp

    Filesize

    408KB

  • memory/2440-4-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2440-6-0x0000000006A50000-0x0000000006AA0000-memory.dmp

    Filesize

    320KB

  • memory/2440-7-0x0000000006B40000-0x0000000006BDC000-memory.dmp

    Filesize

    624KB

  • memory/2440-8-0x0000000007000000-0x0000000007092000-memory.dmp

    Filesize

    584KB

  • memory/2440-9-0x0000000006FC0000-0x0000000006FCA000-memory.dmp

    Filesize

    40KB

  • memory/2440-10-0x00000000747FE000-0x00000000747FF000-memory.dmp

    Filesize

    4KB

  • memory/2440-11-0x00000000747F0000-0x0000000074FA0000-memory.dmp

    Filesize

    7.7MB