Analysis
-
max time kernel
111s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
rARKMONEY.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
rARKMONEY.exe
Resource
win10v2004-20240802-en
General
-
Target
rARKMONEY.exe
-
Size
1.2MB
-
MD5
f7f4bfcd83d9987631beb58d27d1d30e
-
SHA1
f5f8ddbddbab7cf57e9755c9b42cdc536c7391f7
-
SHA256
705dd6f078fb10d234b659a7b663d29f40725e7631b25714ae6d7789853202fb
-
SHA512
6fdb8f9a21208c1c9473c6049d45d5ca754f891a054e8a06de23f74281bda0e08aac954a73db56dbbf84b6db92d0bc78319af150a6d29f061fc9d8ec0a31d57a
-
SSDEEP
24576:UqDEvCTbMWu7rQYlBQcBiT6rprG8azFjq88okgA4:UTvC/MTQYxsWR7azFO5
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org 28 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3080 set thread context of 4080 3080 rARKMONEY.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rARKMONEY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4080 RegSvcs.exe 4080 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3080 rARKMONEY.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4080 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe 3080 rARKMONEY.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4080 3080 rARKMONEY.exe 94 PID 3080 wrote to memory of 4080 3080 rARKMONEY.exe 94 PID 3080 wrote to memory of 4080 3080 rARKMONEY.exe 94 PID 3080 wrote to memory of 4080 3080 rARKMONEY.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\rARKMONEY.exe"C:\Users\Admin\AppData\Local\Temp\rARKMONEY.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\rARKMONEY.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5484a18ec4cd3e3e474a7340367d0d124
SHA1979c36d463d361ffcb36a90dabcf2e04c4115fac
SHA25630ac6074d06d3ba04f6299fe71cf9966c7b12cf4457ff97871ac990d09404d85
SHA512669b172ef411a135826a693505cee951121c5e222804f85390679caa1e6f8189a8a8caf260920123946732d4b44c75b86e24a078077f771522eacc2d784f782f