Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 01:36

General

  • Target

    abdispoofer.exe

  • Size

    4.9MB

  • MD5

    e6668af99f1078b03125d0d05ee0ea16

  • SHA1

    8a63e74aceee47864ec8018eb30bab4911e6fa64

  • SHA256

    247c2d4a4f3d90a0635b2c168b361b6b506e6fdd0f19fef1f69b089a71f3f59e

  • SHA512

    3adfc15e11bee613d06f2f02655590bbc00fb04908c7df78c6e935ca2118eff94ce6034fa33b16bb6b1690fdbda9f8f02836ea97f504f85f8e4559748117aa97

  • SSDEEP

    98304:QzWg2zCdPaQEd51GWRwDGpRIRmrHvkESY6SXvyQJkqXf0F7F:E52YyQEdOWyGpGGnB6SDJkSI

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abdispoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\abdispoofer.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1616-0-0x00007FF8DBD93000-0x00007FF8DBD95000-memory.dmp

          Filesize

          8KB

        • memory/1616-1-0x0000011843280000-0x0000011843768000-memory.dmp

          Filesize

          4.9MB

        • memory/1616-2-0x0000011845430000-0x0000011845442000-memory.dmp

          Filesize

          72KB

        • memory/1616-3-0x000001185DE00000-0x000001185E016000-memory.dmp

          Filesize

          2.1MB

        • memory/1616-4-0x00007FF8DBD90000-0x00007FF8DC851000-memory.dmp

          Filesize

          10.8MB

        • memory/1616-20-0x000001185E250000-0x000001185E302000-memory.dmp

          Filesize

          712KB

        • memory/1616-21-0x000001185DD90000-0x000001185DDB2000-memory.dmp

          Filesize

          136KB

        • memory/1616-23-0x000001185E520000-0x000001185E55C000-memory.dmp

          Filesize

          240KB

        • memory/1616-24-0x00007FF8DBD90000-0x00007FF8DC851000-memory.dmp

          Filesize

          10.8MB