Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 01:23
Behavioral task
behavioral1
Sample
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe
Resource
win10v2004-20240709-en
General
-
Target
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe
-
Size
234KB
-
MD5
87d241498d5647b80b3ae5f7b9b00e0a
-
SHA1
b34fead8f3f8afe7fb6e9ff3443ec06f3000ed9f
-
SHA256
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c
-
SHA512
7b32ec21dfd1fbe6da1de579033c60c70d707ff73ceb6fb1b1880e059c15d3f8247b0ec30797e0f4fa96690bca11ae6be8a33ca2297f55e4f42b04013b781250
-
SSDEEP
3072:oRICC2y8xNaoQAOeDxKBgxtfYawLMv05nCyN0xiRG:oRICbooQAOeDxKBgLYHYv1yWw
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7103128534:AAEX7cqstzGDmw81dLz-shfxzvXALbiavNI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exepid process 3168 f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe 3168 f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exedescription pid process Token: SeDebugPrivilege 3168 f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe"C:\Users\Admin\AppData\Local\Temp\f0ad4598add8aedee80ad36b547e44613d1690cc818564d82c18bdeccaeeb90c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3168-0-0x000000007500E000-0x000000007500F000-memory.dmpFilesize
4KB
-
memory/3168-1-0x0000000000700000-0x0000000000740000-memory.dmpFilesize
256KB
-
memory/3168-2-0x0000000005640000-0x0000000005BE4000-memory.dmpFilesize
5.6MB
-
memory/3168-3-0x0000000005100000-0x0000000005166000-memory.dmpFilesize
408KB
-
memory/3168-4-0x0000000075000000-0x00000000757B0000-memory.dmpFilesize
7.7MB
-
memory/3168-5-0x0000000005DE0000-0x0000000005E30000-memory.dmpFilesize
320KB
-
memory/3168-6-0x0000000005ED0000-0x0000000005F6C000-memory.dmpFilesize
624KB
-
memory/3168-7-0x0000000006910000-0x00000000069A2000-memory.dmpFilesize
584KB
-
memory/3168-8-0x00000000068E0000-0x00000000068EA000-memory.dmpFilesize
40KB
-
memory/3168-9-0x000000007500E000-0x000000007500F000-memory.dmpFilesize
4KB
-
memory/3168-10-0x0000000075000000-0x00000000757B0000-memory.dmpFilesize
7.7MB