Analysis

  • max time kernel
    36s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 08:28

General

  • Target

    f28596a22b369c545afc0e7429b25e76b058dd2c52227d0e3bbe6137259778df.exe

  • Size

    244KB

  • MD5

    61ac354efe49a07212d2d438e9ff3f21

  • SHA1

    10e53c19871633d7012f3b5e0fde072ed0207fb1

  • SHA256

    f28596a22b369c545afc0e7429b25e76b058dd2c52227d0e3bbe6137259778df

  • SHA512

    6920f2821519d5be1b0beb5f7043f05268a193fc4401e15f050167472940c46515158f9b74be469806d2105f0e7cc84d5c89025fd776e5134bc737f41f232b96

  • SSDEEP

    3072:0E9GPoG1F91NltoTGY7a4bczoIX7WTGGOU5Um5M9GCQ:0UGPoKF91NltorgoLKFy5Mw

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7220431026:AAHszs0XzPcajloTXlLJDVKab99uNUvPaok/

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\f28596a22b369c545afc0e7429b25e76b058dd2c52227d0e3bbe6137259778df.exe
    "C:\Users\Admin\AppData\Local\Temp\f28596a22b369c545afc0e7429b25e76b058dd2c52227d0e3bbe6137259778df.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4560-0-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/4560-1-0x0000000000E40000-0x0000000000E84000-memory.dmp

    Filesize

    272KB

  • memory/4560-2-0x0000000005E70000-0x0000000006414000-memory.dmp

    Filesize

    5.6MB

  • memory/4560-3-0x00000000059C0000-0x0000000005A26000-memory.dmp

    Filesize

    408KB

  • memory/4560-4-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-5-0x00000000067B0000-0x0000000006800000-memory.dmp

    Filesize

    320KB

  • memory/4560-6-0x00000000068A0000-0x000000000693C000-memory.dmp

    Filesize

    624KB

  • memory/4560-7-0x00000000071B0000-0x0000000007242000-memory.dmp

    Filesize

    584KB

  • memory/4560-8-0x00000000073A0000-0x00000000073AA000-memory.dmp

    Filesize

    40KB

  • memory/4560-9-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/4560-10-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB