Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 07:19
Static task
static1
Behavioral task
behavioral1
Sample
0044FIDB240149.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0044FIDB240149.exe
Resource
win10v2004-20240226-en
General
-
Target
0044FIDB240149.exe
-
Size
1.1MB
-
MD5
ea7741ac197ebd6d6629eb1958b70e3e
-
SHA1
f67564e643aff147e41bf54d68f72868e74ea6ff
-
SHA256
c570603cc1c666dcf66e70ed333cc4b684475a8b15f6c6432a63ff1ee0b484f6
-
SHA512
c9ece7787a15e4474fad6ac9265c91749d3e6595f48fac345909dfe2d95753b265070e7e78b7cd0c6b866aaed4b4213f60f714090af529bc868ad24312c328a6
-
SSDEEP
24576:nAHnh+eWsN3skA4RV1Hom2KXMmHau3/8Oo/d2+weBN2T4LS+d5:ah+ZkldoPK8YauPL+wcNLLS4
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 api.ipify.org 15 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4256 set thread context of 4768 4256 0044FIDB240149.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4768 RegSvcs.exe 4768 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 484 0044FIDB240149.exe 1052 0044FIDB240149.exe 4256 0044FIDB240149.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4768 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 484 0044FIDB240149.exe 484 0044FIDB240149.exe 1052 0044FIDB240149.exe 1052 0044FIDB240149.exe 4256 0044FIDB240149.exe 4256 0044FIDB240149.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 484 0044FIDB240149.exe 484 0044FIDB240149.exe 1052 0044FIDB240149.exe 1052 0044FIDB240149.exe 4256 0044FIDB240149.exe 4256 0044FIDB240149.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 484 wrote to memory of 2212 484 0044FIDB240149.exe 92 PID 484 wrote to memory of 2212 484 0044FIDB240149.exe 92 PID 484 wrote to memory of 2212 484 0044FIDB240149.exe 92 PID 484 wrote to memory of 1052 484 0044FIDB240149.exe 93 PID 484 wrote to memory of 1052 484 0044FIDB240149.exe 93 PID 484 wrote to memory of 1052 484 0044FIDB240149.exe 93 PID 1052 wrote to memory of 3740 1052 0044FIDB240149.exe 94 PID 1052 wrote to memory of 3740 1052 0044FIDB240149.exe 94 PID 1052 wrote to memory of 3740 1052 0044FIDB240149.exe 94 PID 1052 wrote to memory of 4256 1052 0044FIDB240149.exe 95 PID 1052 wrote to memory of 4256 1052 0044FIDB240149.exe 95 PID 1052 wrote to memory of 4256 1052 0044FIDB240149.exe 95 PID 4256 wrote to memory of 4768 4256 0044FIDB240149.exe 96 PID 4256 wrote to memory of 4768 4256 0044FIDB240149.exe 96 PID 4256 wrote to memory of 4768 4256 0044FIDB240149.exe 96 PID 4256 wrote to memory of 4768 4256 0044FIDB240149.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"2⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"3⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\0044FIDB240149.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4168 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3380
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5ff8f2d45bb8e8e236a448243d3b1b9af
SHA14279884d681bb009655462ae0964872001d726b6
SHA256dbebdbc0b275253de49da70c612af8607d97bee88b0ec0b9e386f4ebf6202f2b
SHA5128211c24d2be3704da614485b00d60e6caf9a3fd507eacc4b09ab55c73be2d9f922c16a5834ad46086e5003d5b449650d461afb6ff16c8a8f603a9572b65c57dc
-
Filesize
9KB
MD543395d76ed85d1ffabc4262deea52121
SHA19c1e52d6d0b093fc162364113f8fa29b9cae5b54
SHA256438b911cc139e7533dc94f914bc683183cdf1952e53ad105c4f7794f13c40d9d
SHA5120b2182da744bc79272095d1c422cfc23fe5a397d07171637556eabbd6d35e39c10d6756df9441ff138ab3243ae4889640a74e04a4605219bf7404489991296f6
-
Filesize
261KB
MD5170b7b94a82d018baf3953dfb35e6769
SHA12c7e4b6574cb815b95126ee113cedc5778b51686
SHA256340f8984e26e4ee6957807098d181f28efb3bcd68e328be8ac54770d84430776
SHA5129b12e176eb435d7a0b94a17be8e500750e31957b7bac2ef9a559340bdeab120193d17f8cbd7004643617d0d4a803dc9c1525499a27ebf001e2f3c4458c5d2a0f
-
Filesize
28KB
MD5115f60065d3417ba338641bb2fb03e40
SHA1f966fdbc340b926223abb11f2f48f38775211f83
SHA256c19f0ae153df10c5d81c2bdfc15baedd750cd5c1fd613c8db4225ce0291fb46e
SHA512356e0bcd8da60ecd58d373e9017f66e777efa6b40c30469f071da9b50df68bc75fd9ca91ec72b26eda16dd4533afc8c6e0d41a97c9a8f4bb6b2d202b8d0ee86e