Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 01:37
Behavioral task
behavioral1
Sample
0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe
Resource
win10v2004-20240226-en
General
-
Target
0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe
-
Size
164KB
-
MD5
75d1dca0cffa7c1aad24ea5ffa93dd53
-
SHA1
afbe1175673c08cb1489ad2f4e32f4be85f78bf9
-
SHA256
0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4
-
SHA512
5b84cfc3935792521cd4244e467cfac07e44857f2e929db27c738ca75d7b420e9a4ee3bd65f4e28cd2323b17c741044a22b047783e5f6c6a55c33857ea32f216
-
SSDEEP
3072:Ppb2xcb2M1CL4BnjYX3ylyQ6OnRF7Gr3k+xU2j:PgcbYinkXcyQ6OnR03+2
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.eculantltd.me - Port:
587 - Username:
[email protected] - Password:
best@qwerty - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1304 0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe"C:\Users\Admin\AppData\Local\Temp\0cce272b99fb698e8f758d0eb313486f8b5e8cb3db8a68bb900333553d1878b4.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1304