Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe
Resource
win10v2004-20240802-en
General
-
Target
dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe
-
Size
1.3MB
-
MD5
9d9add306867d29b9b665c6c7b65b053
-
SHA1
07030039678cd165662d4019b18b8f4c1a012c5f
-
SHA256
dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c
-
SHA512
a05dc2209a8de1771e7275c96152009972aa1fba34247639befe537a8af75ab7e64234ab343112062f32e5b971a40ea71602bb75ccf2376b69dfb7bb6112e7b4
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8aE545pGu0nbkTEamFblGg+y6tuI6l:6TvC/MTQYxsWR7aE545pGu0nbkT4lkgq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org 23 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2444 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2444 RegSvcs.exe 2444 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2444 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3396 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 87 PID 3752 wrote to memory of 3396 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 87 PID 3752 wrote to memory of 3396 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 87 PID 3752 wrote to memory of 692 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 88 PID 3752 wrote to memory of 692 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 88 PID 3752 wrote to memory of 692 3752 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 88 PID 692 wrote to memory of 3252 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 90 PID 692 wrote to memory of 3252 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 90 PID 692 wrote to memory of 3252 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 90 PID 692 wrote to memory of 4576 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 91 PID 692 wrote to memory of 4576 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 91 PID 692 wrote to memory of 4576 692 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 91 PID 4576 wrote to memory of 1536 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 92 PID 4576 wrote to memory of 1536 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 92 PID 4576 wrote to memory of 1536 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 92 PID 4576 wrote to memory of 2348 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 93 PID 4576 wrote to memory of 2348 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 93 PID 4576 wrote to memory of 2348 4576 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 93 PID 2348 wrote to memory of 2444 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 96 PID 2348 wrote to memory of 2444 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 96 PID 2348 wrote to memory of 2444 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 96 PID 2348 wrote to memory of 2444 2348 dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"2⤵PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"3⤵PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"4⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\dccd011bce927cea2b3f0d2ff0198a100df5d3f522f12e4d2fbff9d8e568528c.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD54477262c56d1d6ea1899ae24acf276f1
SHA1e89ac4a04b7966949010293c45904b30dc387a48
SHA256c945c43ba1574a188eea0d7b5199bc764374b22a96aade2bbd729393bb7e4949
SHA512fb0ea3b41a1cf31e923cf0ae0c515a7500a9321712ed3a3d9b829383c9d19c51df03c18dc12df078def85a6271773c56f4847f9a358d2bad15435ac9498b17f1
-
Filesize
42KB
MD55eecf99f9c1f5473bc41e9c22953ecd9
SHA1fbeea15d9859c0dbfb13fe57b9560c5ae9a00d4f
SHA256f08ddabcb67efc66efc7cfa0bb72fb21c77e41d732b2c5e65d0bec100e2710d0
SHA512bfbabf9536d06370e485127f9c0eb6158de3ba3fba1f5d44c464115785d9c706176d47d58266e0ad615587acb364dca96c658ea6bc7b50268d3369d77e07a156
-
Filesize
84KB
MD5e86b31441deb697668037db6f0318909
SHA1fa8001036450225641b46de50e3626ecdfc8b974
SHA256432ab1d0c59fc0a292bb92180706d7e7207f589817a90e7b72b91d0f1417164f
SHA5120406807df5720df649af79cd2a899985c0fc5b07558dd0dc42675080f2f445b1f4a2b38355146bfead6f1a3dfb74d629256905cc549d97e6de8e9fdf7a3b7d1c