Analysis
-
max time kernel
146s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe
Resource
win10v2004-20240508-en
General
-
Target
dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe
-
Size
1.2MB
-
MD5
d13e2b48430c76af1370c89131cee57e
-
SHA1
93b00858190f10f0946f2e9c34cc339ef9905800
-
SHA256
dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890
-
SHA512
57e1390a781f6f0aadb01f94107b339dabf66c1e7184e8ccef6b804b751ac099cc9148736459fe8e0d47c919ca078d7a336db75aac5bf8fe5d6cb6f577233ba9
-
SSDEEP
24576:gAHnh+eWsN3skA4RV1Hom2KXMmHaSMzXy9VaV/RAqWEbbwL5:Xh+ZkldoPK8YaSAi2zx4
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 3240 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3240 RegSvcs.exe 3240 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3240 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2004 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 80 PID 1052 wrote to memory of 2004 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 80 PID 1052 wrote to memory of 2004 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 80 PID 1052 wrote to memory of 4060 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 81 PID 1052 wrote to memory of 4060 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 81 PID 1052 wrote to memory of 4060 1052 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 81 PID 4060 wrote to memory of 2912 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 82 PID 4060 wrote to memory of 2912 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 82 PID 4060 wrote to memory of 2912 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 82 PID 4060 wrote to memory of 2796 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 83 PID 4060 wrote to memory of 2796 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 83 PID 4060 wrote to memory of 2796 4060 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 83 PID 2796 wrote to memory of 3240 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 84 PID 2796 wrote to memory of 3240 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 84 PID 2796 wrote to memory of 3240 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 84 PID 2796 wrote to memory of 3240 2796 dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"2⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"3⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dcd56e56cc9a8b7ee966055fe3c227b13f65652b923aefc9cdcde56461e5f890.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD52326417cea6ba8579886e9015154c929
SHA166e7cb6674193355aa5f9624aadf53da35e66397
SHA256b4d360e5f64c772df4efaa19e2652f78e52585b68ebea830bd5dda708b586d94
SHA512d6ea8bc419c22dc8cace200a78179af40ea29b496ca4a6a5fd5ee9aa6dadcdd2768ef9f46f1fc162e9f2a2fed9f9eac010ca494df15ba20dd2d7c2ac33357a73
-
Filesize
9KB
MD58ac04cd6d2f61fc8783db291a39c134b
SHA1398c64f7a5952ff8e87f9fb488b9f4dd45643926
SHA2563ec14b980dff7c211ac191d3a9da1306803583cfc7fe7ccd6518348c8cc1c6ea
SHA512f48aa8d47f306102b8f0444f3e3ac0923ed2521db97809d2e514b78dc9495cd27683aa435bc9d87b111270ac46267f8c8699f28060b960f37e42145926bfafe8
-
Filesize
28KB
MD57304794291d458f346db2206f9f8e45f
SHA13e897520738862e274a950430df1fc7fa5796c62
SHA256616b188b7bc01f4a13fc235726c1d8d71b74c548d59a0f562f7dda1757934c79
SHA51249e3705cefa450dfedc90f42beacf23a114d9a9e68134d48a9f735a7bf285ed5da9df90d909a58211e3c05f55dd12d710affca353c56ef2cf97926346f757c53