Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe
Resource
win11-20240426-en
General
-
Target
a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe
-
Size
1.2MB
-
MD5
8cc057c58bd59166922b1a6fbf9a0ec7
-
SHA1
b4872f04759419dc561e3ff75fc81aac19408864
-
SHA256
a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8
-
SHA512
ca22d84496d447d687840d0a50a95e19820cf8954c7d3231bbaf8c08e17c7636a6474a5a3448ed4315fa8f63e424bdb9c4d2d49bf90b3d5e0a2963133447c585
-
SSDEEP
24576:AmAHnh+eWsN3skA4RV1Hom2KXMmHaSqZjj0k1iF2OsfTEE55X5:ABh+ZkldoPK8YaSsN14kfTEm
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 api.ipify.org 15 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 4536 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 RegSvcs.exe 4536 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4536 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 85 PID 1400 wrote to memory of 4536 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 85 PID 1400 wrote to memory of 4536 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 85 PID 1400 wrote to memory of 4536 1400 a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe"C:\Users\Admin\AppData\Local\Temp\a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\a8d26936158b1aa8cd328768955b747c2f563dc95ed9245fd132befc7dedc3d8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5682f232a7b5ace724f2540315ee267ce
SHA1c4b20ef860df43a861d3e174f3e5f679e7018797
SHA2561558ca5eb218e0677be24c10ba8552d686d702f419721473b46c8071369c2d84
SHA512f14d4c8ffa7fd80185474b7f8db2ef9f4f08dcb355f6dd8bae554d5f40d73dff206c35e7c010d0dced1ba6a7dc3823185f7afdccfcc3bd660f59b9cfe21fda1d