Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe
Resource
win10v2004-20240802-en
General
-
Target
ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe
-
Size
1.1MB
-
MD5
eb4d07f7aa59e7b313fba17f44004262
-
SHA1
70c2427dd9f0ad884b1157cbed0d550df9903452
-
SHA256
ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5
-
SHA512
4b34abc556feafacd372dc383fec0612a0e816d9d89bcf0aad7f5cc966d3004862f3cc0cbc80d1fd8aadfa2ddbaa5543c2099d5bcfe2ecf0e6415967abc87680
-
SSDEEP
24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8a6GUjU+6SmA:STvC/MTQYxsWR7a6GUjUI
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rrcindia.co.in - Port:
587 - Username:
[email protected] - Password:
Goyal@0783 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 796 name.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org 28 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c0000000233ec-14.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 796 set thread context of 3344 796 name.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3344 RegSvcs.exe 3344 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 796 name.exe 796 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3344 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe 796 name.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3716 wrote to memory of 796 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 91 PID 3716 wrote to memory of 796 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 91 PID 3716 wrote to memory of 796 3716 ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe 91 PID 796 wrote to memory of 3344 796 name.exe 95 PID 796 wrote to memory of 3344 796 name.exe 95 PID 796 wrote to memory of 3344 796 name.exe 95 PID 796 wrote to memory of 3344 796 name.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe"C:\Users\Admin\AppData\Local\Temp\ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5d5d1e82f394d186e561d014d2a71231f
SHA10aca292245da7fb900647bbf8a3ef7eaf56428cc
SHA25650f749c532e0dbb4fa0a4d9aa178e7e0995dd368d144017e1cb249e4dda08126
SHA5128d86132d20baf32e974b46eff83458c0c31099ab01599376ff55c695d0d4608d318eddf0236c7b1dfa22c54db726af478a1e4f1b8cc0e28cd3cb5719cb2a64c8
-
Filesize
1.1MB
MD5eb4d07f7aa59e7b313fba17f44004262
SHA170c2427dd9f0ad884b1157cbed0d550df9903452
SHA256ccba2d4f646c750075acb6931fb502965124df5def59ab4c1979cce417c34ac5
SHA5124b34abc556feafacd372dc383fec0612a0e816d9d89bcf0aad7f5cc966d3004862f3cc0cbc80d1fd8aadfa2ddbaa5543c2099d5bcfe2ecf0e6415967abc87680