Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe
Resource
win10v2004-20240508-en
General
-
Target
278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe
-
Size
961KB
-
MD5
226bc4742070377134dad87de9febd8f
-
SHA1
0c5aeb1c5807536b8660ffa32febea425910aea8
-
SHA256
278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7
-
SHA512
bfb2006f2663e097a4ed4e771db449cf8486f91713199db794c8aa89a25f5dd93e9ed29ffdb13cd3e3d74c4d49789ab82194c2b1485ee1128280b01a5b264ec6
-
SSDEEP
12288:GyIN+YFTn7VwJZgW6zQ0BUKOPYm7lmB+BGaIF7N+eWk58JW2BVAS+LMdWtcEtfd8:K8Jj6PU5l7l6daUN+eWuqBizLMOVj1
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1126419955634688050/yHbrubx366X_Wn_C4JcQbucXxlXRqxsG0O4bz5LxWso8RUXTpr0uNHjuz89z2GRXyE-6
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 discord.com 27 discord.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4296 set thread context of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2960 Caspol.exe 2960 Caspol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe Token: SeDebugPrivilege 2960 Caspol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 Caspol.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 PID 4296 wrote to memory of 2960 4296 278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Caspol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe"C:\Users\Admin\AppData\Local\Temp\278eaac2233aa9f956f7063ecae46b05271484a695f0fc6552d33c01597febc7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2960
-