Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 01:58

General

  • Target

    77fd58789cadf2f53c7a9ee50f3a80baafb6fb8d7567afb4d66c081fef0857d4.exe

  • Size

    233KB

  • MD5

    a5e2d8aa014a6348667249b07e55fdce

  • SHA1

    8406c6463a6a02aa82e399721ff3044d2d3b6e04

  • SHA256

    77fd58789cadf2f53c7a9ee50f3a80baafb6fb8d7567afb4d66c081fef0857d4

  • SHA512

    f57f619881dd75feeca4e80f1b0148d6d20bf810a18f12f0565399418702f9efca3012cf3effeeac3be708faa7501742c5dd461d1231cf9052df1a3ef5cf1c83

  • SSDEEP

    3072:i8KBjHb3TUh4eId0jR4DXgiuy2Syeu5Cwo1T+:FKBjHb3T3eId6RYwiuOyeMoB

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://inhanoi.net.vn
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ^TSt3!FK$UBA

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\77fd58789cadf2f53c7a9ee50f3a80baafb6fb8d7567afb4d66c081fef0857d4.exe
    "C:\Users\Admin\AppData\Local\Temp\77fd58789cadf2f53c7a9ee50f3a80baafb6fb8d7567afb4d66c081fef0857d4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/580-0-0x000000007436E000-0x000000007436F000-memory.dmp

    Filesize

    4KB

  • memory/580-1-0x0000000001310000-0x0000000001350000-memory.dmp

    Filesize

    256KB

  • memory/580-2-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/580-3-0x000000007436E000-0x000000007436F000-memory.dmp

    Filesize

    4KB

  • memory/580-4-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB