Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 01:42
Behavioral task
behavioral1
Sample
f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe
Resource
win7-20240508-en
General
-
Target
f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe
-
Size
708KB
-
MD5
e0026df83e1aa08616a11d9104faad46
-
SHA1
1740312c7651b432fa0ab47819919ec034f8c67b
-
SHA256
f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b
-
SHA512
6564396ef6b396ae3ee367e6285924d04b4ee2171af4c58c195a61a1a2093adee4baea01e36e58a616fd70257119945666d95f3a943c0e057f1ec66fb64eeb29
-
SSDEEP
12288:mYV6MorX7qzuC3QHO9FQVHPF51jgcq556I95wyWr5vkTj5+u4Q3lfT1VP9v:lBXu9HGaVHpm5fWrBkToEV71v
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1251110202149699625/eDNZWTFoHBDo8HXw0aunmvGeBWciM4C8KyCpUHy9gEFPn1XyMs30gAsSjfRX6u9Vnuig
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4. 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables Discord URL observed in first stage droppers 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables referencing Windows vault credential objects. Observed in infostealers 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables referencing many file transfer clients. Observed in information stealers 33 IoCs
resource yara_rule behavioral2/memory/1416-18-0x00000000033A0000-0x00000000033F8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-22-0x0000000005990000-0x00000000059E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-24-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-23-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-82-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-80-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-78-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-76-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-74-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-70-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-68-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-66-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-64-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-60-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-58-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-56-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-54-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-52-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-50-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-48-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-44-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-42-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-40-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-38-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-36-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-30-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-27-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-72-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-62-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-46-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-34-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-32-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral2/memory/1416-28-0x0000000005990000-0x00000000059E1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/5056-0-0x0000000000140000-0x00000000002CF000-memory.dmp UPX behavioral2/memory/5056-16-0x0000000000140000-0x00000000002CF000-memory.dmp UPX -
resource yara_rule behavioral2/memory/5056-0-0x0000000000140000-0x00000000002CF000-memory.dmp upx behavioral2/memory/5056-16-0x0000000000140000-0x00000000002CF000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 discord.com 23 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5056-16-0x0000000000140000-0x00000000002CF000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5056 set thread context of 1416 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1416 RegSvcs.exe 1416 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1416 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1416 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1416 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 85 PID 5056 wrote to memory of 1416 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 85 PID 5056 wrote to memory of 1416 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 85 PID 5056 wrote to memory of 1416 5056 f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe"C:\Users\Admin\AppData\Local\Temp\f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\f154ccb1d9e7b8fe43b53c055b89ba3bb6b4626ba307c56225287a4e8495754b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1416
-