Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 19:12
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
04.exe
Resource
win7-20240611-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
04.exe
Resource
win10v2004-20240226-en
9 signatures
150 seconds
General
-
Target
04.exe
-
Size
1.1MB
-
MD5
be1ecd7c5c0580b3a1803fdc32adb6a5
-
SHA1
9e8e1119d9c04d7e91fbb3ce5f610eabf656de47
-
SHA256
550bcd716d25eeb3be5bd9aa4686f89fa2d65d4a719eedaefcb289c1b823337e
-
SHA512
c46b3951eda30fd6333beca19080aefb0749b6b3ff223e455f6ed5d9796ad695bbd6c45d88be99d02da6b2ed9bfcb96cfc7b515ebd77ea876c27900c3967c54d
-
SSDEEP
24576:aAHnh+eWsN3skA4RV1Hom2KXMmHaZoO2SuWM175:th+ZkldoPK8YaZbuh3
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.funworld.co.id - Port:
587 - Username:
[email protected] - Password:
fwp123mail - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5112 set thread context of 1140 5112 04.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1140 RegSvcs.exe 1140 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5112 04.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1140 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5112 04.exe 5112 04.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5112 04.exe 5112 04.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1140 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1140 5112 04.exe 90 PID 5112 wrote to memory of 1140 5112 04.exe 90 PID 5112 wrote to memory of 1140 5112 04.exe 90 PID 5112 wrote to memory of 1140 5112 04.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\04.exe"C:\Users\Admin\AppData\Local\Temp\04.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\04.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:2436