Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe
Resource
win10v2004-20240426-en
General
-
Target
SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe
-
Size
1.1MB
-
MD5
349d723ecd0a2370dd03befb829bbfe2
-
SHA1
91035d07ec0a4f68cdf21a346f08a36c251cf553
-
SHA256
713d258a9f5522e345d7ecf7b82e2f69c8eaf53536ccb9d582e27d0d981861fb
-
SHA512
68e7fe24bae4a7e7e7272e37013e9d852d43a7d025bcec8354bca30ff7873f0ae5495cad39ad02fae8a43c9711ecdcddd871e12bd1d95c9d6874bb81f77bbdd1
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHam7t1SkxMEpXCm1cv7H5:2h+ZkldoPK8Yam7zS0npSmqvN
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5704903332:AAGQ75Wg6lHVUpPODprifDQYP0_98wUeols/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 api.ipify.org 16 api.ipify.org 17 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5112 set thread context of 4308 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4308 RegSvcs.exe 4308 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4308 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 85 PID 5112 wrote to memory of 4308 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 85 PID 5112 wrote to memory of 4308 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 85 PID 5112 wrote to memory of 4308 5112 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5a919781d7c42fb911b1ea668f7606c06
SHA18f8eb180558b2a207ab50ee34ddfb649a5f975b8
SHA25676bf59223dc44cbbcdebd307d450aad401731fbd5a1649d1c6840ce668faa055
SHA51267941697498177a82063f5064b5cda2a9849d6445339c5707d3e91beda263305b63f10ac25a576bfda34080089ef5e11d29576c142c2c54e84df623f6377b6be