Resubmissions

07-08-2024 02:16

240807-cqhbyaybkj 5

07-08-2024 02:12

240807-cm737ayanj 10

Analysis

  • max time kernel
    105s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 02:12

General

  • Target

    ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe

  • Size

    1.2MB

  • MD5

    ec786fad02a45cd0c757e5188f194389

  • SHA1

    dc0f16c4a56e632ff256c5fef9a098e4b7014206

  • SHA256

    ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f

  • SHA512

    a97c25426cc65ecb7d20d5b435d6c103c13630077a39168d9de211355acc1556a41610cf1a5cc334c4951f34ef95fc0e939f2d38b2be0612d315f184f3912716

  • SSDEEP

    24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8aMx/gW/miUUMPD8J9o:gTvC/MTQYxsWR7aMGW/VUUMrE

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe
    "C:\Users\Admin\AppData\Local\Temp\ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\ce46e26eae5bbf50d9ea07bb76b77addedbb3bb8282356e88bdc9da54b6e929f.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aut79D3.tmp

    Filesize

    261KB

    MD5

    34c0a34e3fbe29042a69eee3a7233312

    SHA1

    556282b74a252fe5478a914efd08a6e6113d069e

    SHA256

    30031538710112beff2420f384c95f59c0d7ce63f23c700e42fdc6d2334e033d

    SHA512

    2fd2cdc7217510f1b604d56f1223198ae62ea2be50d52ff8fdb991210967722cb43e4657f2d3d2dc3ecdb4fec8c7323224278d88cd73222fe837e7414ff281b9

  • memory/1188-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1188-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1188-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1188-16-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1188-18-0x0000000073A6E000-0x0000000073A6F000-memory.dmp

    Filesize

    4KB

  • memory/1188-19-0x00000000055A0000-0x00000000055F4000-memory.dmp

    Filesize

    336KB

  • memory/1188-20-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/1188-23-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/1188-22-0x0000000005630000-0x0000000005682000-memory.dmp

    Filesize

    328KB

  • memory/1188-24-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/1188-21-0x0000000005BA0000-0x0000000006144000-memory.dmp

    Filesize

    5.6MB

  • memory/1188-28-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-30-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-80-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-64-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-40-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-26-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-25-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-84-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-82-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-78-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-76-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-74-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-72-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-70-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-1055-0x0000000005800000-0x0000000005866000-memory.dmp

    Filesize

    408KB

  • memory/1188-1056-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/1188-68-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-66-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-62-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-61-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-58-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-56-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-54-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-52-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-50-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-48-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-46-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-44-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-42-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-38-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-36-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-34-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-32-0x0000000005630000-0x000000000567D000-memory.dmp

    Filesize

    308KB

  • memory/1188-1057-0x0000000006C80000-0x0000000006CD0000-memory.dmp

    Filesize

    320KB

  • memory/1188-1058-0x0000000006D70000-0x0000000006E02000-memory.dmp

    Filesize

    584KB

  • memory/1188-1059-0x0000000006D60000-0x0000000006D6A000-memory.dmp

    Filesize

    40KB

  • memory/1188-1060-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1188-1061-0x0000000073A6E000-0x0000000073A6F000-memory.dmp

    Filesize

    4KB

  • memory/1188-1062-0x0000000073A60000-0x0000000074210000-memory.dmp

    Filesize

    7.7MB

  • memory/3828-13-0x0000000001F30000-0x0000000001F34000-memory.dmp

    Filesize

    16KB