Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe
Resource
win10v2004-20240426-en
General
-
Target
7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe
-
Size
1.2MB
-
MD5
0ed3cf6d08a004d3a2919aa83f1322a6
-
SHA1
a4d661a75085cc9ad1d5c43a0a6a231df19f6c71
-
SHA256
7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e
-
SHA512
888337ade4c215c301d02256f81d148f71aeed3e4b938272168f23909730fca11a9d9a3797b6d8857f7ef8cb79a40f2f9460bb9e4c11ef68d1437216e77d84a2
-
SSDEEP
24576:7AHnh+eWsN3skA4RV1Hom2KXMmHaUFB3WbQa/R9szWv0D5:Wh+ZkldoPK8YaULza/b0Wvo
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 808 set thread context of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2620 RegSvcs.exe 2620 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2620 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28 PID 808 wrote to memory of 2620 808 7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe"C:\Users\Admin\AppData\Local\Temp\7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7488ca7862e4f048641887a7b5871c2c6951a7b0bb7c1fe2280791ee67c3170e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5774d2a06cf8b151348074b4d98a0604f
SHA1dd9fc030835ba20611a2297ef93c868a88d63377
SHA25613c49c7dfe916cb12438f15b7ce4ed3118a058a601f23af2acf07e6f96446239
SHA512409748f76e589a84fc992f74281bff244af7c0248d8e7022896730c0d02527f7813b9138df665496a856200c20fb16a7f8a05a9cbd6057836020c021b2f34abb