Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2024, 02:00

General

  • Target

    Electro-08282024.exe

  • Size

    1.2MB

  • MD5

    9d3827e8622b4221588f60a3273cb725

  • SHA1

    1f1521c7c0d0f999d1afa921036082729fdb9261

  • SHA256

    cec92fba69ba56563b3e84ed87291bfb50a85a6e44b6a9b5cd698c00c380e0f0

  • SHA512

    661900d0386cee1af5806a6ad274f2f7dfe3d4624bf065814a509b84d1ed905c86449a64b879d3283dedb9b88d4189423e30f967e9f268c6e8094b35eb0cca51

  • SSDEEP

    24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8aF7wVq+wnazZkzFdd:8TvC/MTQYxsWR7aFAVlkzj

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Electro-08282024.exe
    "C:\Users\Admin\AppData\Local\Temp\Electro-08282024.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\Electro-08282024.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aut8B48.tmp

    Filesize

    263KB

    MD5

    6f2b74a79584c48717794db5d55731d8

    SHA1

    148e3f5d3e6b2ea06ad1e86e2b8665d598afca97

    SHA256

    e5d50f8ba992e685b13a4e789f987395f39badfd5b6a849632f325af81f879cd

    SHA512

    42a691ef58db61d2c5f24b8f2fc4becda3b73e902d2ceb3861140021924c32415017c5892d6adf6bfd79a850a9b1865fca00675203d7992763e51e493b584f07

  • memory/1676-14-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1676-17-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1676-16-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1676-15-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1676-18-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/1676-19-0x00000000033B0000-0x0000000003406000-memory.dmp

    Filesize

    344KB

  • memory/1676-20-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1676-22-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1676-21-0x0000000005F80000-0x0000000006524000-memory.dmp

    Filesize

    5.6MB

  • memory/1676-23-0x00000000058C0000-0x0000000005914000-memory.dmp

    Filesize

    336KB

  • memory/1676-24-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1676-42-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-40-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-86-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-84-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-80-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-78-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-76-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-74-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-70-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-68-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-66-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-64-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-62-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-58-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-56-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-54-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-52-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-50-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-48-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-46-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-44-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-38-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-36-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-34-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-82-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-72-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-60-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-32-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-30-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-28-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-26-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-25-0x00000000058C0000-0x000000000590E000-memory.dmp

    Filesize

    312KB

  • memory/1676-1093-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1676-1094-0x0000000005AD0000-0x0000000005B36000-memory.dmp

    Filesize

    408KB

  • memory/1676-1095-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1676-1096-0x0000000006DE0000-0x0000000006E30000-memory.dmp

    Filesize

    320KB

  • memory/1676-1097-0x0000000006ED0000-0x0000000006F62000-memory.dmp

    Filesize

    584KB

  • memory/1676-1098-0x0000000006E60000-0x0000000006E6A000-memory.dmp

    Filesize

    40KB

  • memory/1676-1099-0x000000007484E000-0x000000007484F000-memory.dmp

    Filesize

    4KB

  • memory/1676-1100-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1676-1101-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1676-1102-0x0000000074840000-0x0000000074FF0000-memory.dmp

    Filesize

    7.7MB

  • memory/1860-13-0x0000000003B40000-0x0000000003B44000-memory.dmp

    Filesize

    16KB