Analysis
-
max time kernel
95s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 03:48
Behavioral task
behavioral1
Sample
F0987654678000.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
F0987654678000.exe
Resource
win10v2004-20240802-en
General
-
Target
F0987654678000.exe
-
Size
585KB
-
MD5
e4abeca3f1e138479cda142530fbc810
-
SHA1
5b010c25a6b4702d6d0ea9c48d2a3339de5d5182
-
SHA256
b50fc7113a6c52967913e5bada3755364af76c2188ed621af5f23c3669648425
-
SHA512
93b8dea3bc03d88c1ac6e6b0e171f3db2153f73c139dc513b6ee16c74f4499461e92cf06bf2421fef2463f0441f8db655c1c4ae38c2c1705fe805035e31a5ab3
-
SSDEEP
12288:yYV6MorX7qzuC3QHO9FQVHPF51jgcdF++2Jw4THc7E6mVIE:BBXu9HGaVHWxJwGHcg6mv
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Grinnellia.vbs Grinnellia.exe -
Executes dropped EXE 1 IoCs
pid Process 3832 Grinnellia.exe -
resource yara_rule behavioral2/memory/2816-0-0x0000000000210000-0x0000000000361000-memory.dmp upx behavioral2/files/0x0002000000022f9b-15.dat upx behavioral2/memory/2816-17-0x0000000000210000-0x0000000000361000-memory.dmp upx behavioral2/memory/3832-18-0x0000000000870000-0x00000000009C1000-memory.dmp upx behavioral2/memory/3832-36-0x0000000000870000-0x00000000009C1000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2816-17-0x0000000000210000-0x0000000000361000-memory.dmp autoit_exe behavioral2/memory/3832-36-0x0000000000870000-0x00000000009C1000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 4820 3832 Grinnellia.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F0987654678000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Grinnellia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4820 RegSvcs.exe 4820 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3832 Grinnellia.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4820 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2816 F0987654678000.exe 2816 F0987654678000.exe 3832 Grinnellia.exe 3832 Grinnellia.exe 3832 Grinnellia.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2816 F0987654678000.exe 2816 F0987654678000.exe 3832 Grinnellia.exe 3832 Grinnellia.exe 3832 Grinnellia.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3832 2816 F0987654678000.exe 85 PID 2816 wrote to memory of 3832 2816 F0987654678000.exe 85 PID 2816 wrote to memory of 3832 2816 F0987654678000.exe 85 PID 3832 wrote to memory of 4820 3832 Grinnellia.exe 87 PID 3832 wrote to memory of 4820 3832 Grinnellia.exe 87 PID 3832 wrote to memory of 4820 3832 Grinnellia.exe 87 PID 3832 wrote to memory of 4820 3832 Grinnellia.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\F0987654678000.exe"C:\Users\Admin\AppData\Local\Temp\F0987654678000.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\juvenile\Grinnellia.exe"C:\Users\Admin\AppData\Local\Temp\F0987654678000.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\F0987654678000.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD58100d54cd1da2d955aec2442330b9a3a
SHA1b56fbf35202ebf525ff736d7844ab285b9193c5a
SHA256295ef8d029e2ba16fccc828745d7f260ab4cea90ab2c01094b85e0bcbf0c17cd
SHA5124d46527585f0b908b60993e3c69ba5fe7fec84ebcfb69eaa842d6fc7486f0f00462542d7116b4b04032eaad9edd555f50e765415e67c9e86da0e966c6c0cf243
-
Filesize
203KB
MD50f0e24395c2e1a1042f0ae0cb9808b30
SHA164eb183637e19f0e81d58fe3f563a33b1db761bc
SHA256ec2be3d8ca3919ff410f92468a94f348783853cc75cc2c078ba75748f1ae0ff1
SHA512a044c8c063588dd7c7652f6a7b7b547818770002894da658c969a225c509d29d8d321d43dd8a9dcb19624fac12a77cc3d5271c0cb409ba668768f06984d20128
-
Filesize
585KB
MD5e4abeca3f1e138479cda142530fbc810
SHA15b010c25a6b4702d6d0ea9c48d2a3339de5d5182
SHA256b50fc7113a6c52967913e5bada3755364af76c2188ed621af5f23c3669648425
SHA51293b8dea3bc03d88c1ac6e6b0e171f3db2153f73c139dc513b6ee16c74f4499461e92cf06bf2421fef2463f0441f8db655c1c4ae38c2c1705fe805035e31a5ab3