Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe
Resource
win10v2004-20240709-en
General
-
Target
35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe
-
Size
1.2MB
-
MD5
f01872cd9fab0d37d8137e88ae9036d7
-
SHA1
8efdebb1361d448ee07ba883b6d7304acd2033a9
-
SHA256
35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799
-
SHA512
507bd699958a5f82c5a0410ebe6cfe74746ef0d3431c3e7e04d04390da8e6648d8f02ff56e1c409d9e5ee29ed6506585cdcd070ee7a9185f9be432e1aac4f88d
-
SSDEEP
24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8avFS2bMZp27D75:GTvC/MTQYxsWR7avoVLoD
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2628 set thread context of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1524 RegSvcs.exe 1524 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1524 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31 PID 2628 wrote to memory of 1524 2628 35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe"C:\Users\Admin\AppData\Local\Temp\35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\35b15afa6e5c449213fc629085e9dd8bc84d54c8cc883c8fdced113307e40799.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5e39327a511042ff4415791a2a9e9980b
SHA1714ad27f1cdbab22a658df5b5f15775eaf5f5ef0
SHA256071ab4785d9122f8603df24a8b8b5af76d4b35bd7c429789fb4fa75b292dd18d
SHA5124d9e703f971014af9d41128ed3961ad3eb8b56d430748a9a5558eaf802e747ef25b7cea88b64f0ed79cfd80a04cdc02dc5c61499c148ff6d0d3163b3ce28305d