Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:03
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
202406018.exe
Resource
win7-20240221-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
202406018.exe
Resource
win10v2004-20240611-en
9 signatures
150 seconds
General
-
Target
202406018.exe
-
Size
1.1MB
-
MD5
de745f10d7a70863b806490ea1901733
-
SHA1
926cf203447b9ba289039fcb20ca2ecd4e91fec9
-
SHA256
3a066a770eabfe2d33e16ab8afc4ee5e045f704a76848ce6567812c5a8ffb268
-
SHA512
166c9ad781afc35faddf6c918b74be1387d59fddb4f1f14497be386f6843762356e8f218fc2e3531213becaa1f4e2a0d7f5712eb63e4557ca7fc63cd227c6ce2
-
SSDEEP
24576:nAHnh+eWsN3skA4RV1Hom2KXMmHaJy3hCHqOIYn5:ah+ZkldoPK8YaJyxZtA
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.funworld.co.id - Port:
587 - Username:
[email protected] - Password:
fwp123mail - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4956 set thread context of 4536 4956 202406018.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 RegSvcs.exe 4536 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4956 202406018.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4956 202406018.exe 4956 202406018.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4956 202406018.exe 4956 202406018.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4536 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4536 4956 202406018.exe 89 PID 4956 wrote to memory of 4536 4956 202406018.exe 89 PID 4956 wrote to memory of 4536 4956 202406018.exe 89 PID 4956 wrote to memory of 4536 4956 202406018.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\202406018.exe"C:\Users\Admin\AppData\Local\Temp\202406018.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\202406018.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4536
-