Analysis
-
max time kernel
16s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 14:01
Behavioral task
behavioral1
Sample
ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe
Resource
win10v2004-20240802-en
General
-
Target
ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe
-
Size
592KB
-
MD5
1d3515d7b35420db17ea6ea8632881be
-
SHA1
86d9b85d182c241be7416799d9ee028a388abc66
-
SHA256
40c5238cabc2bbe9427c93a637af3393184ce08003776cf0d2cc21aaa8e453b0
-
SHA512
3941b0e19f479f4d0f4e791612da362e0325882225af6c0fb80cae858f75bac9b4caffca72600228cf8659ea0ad34ffffc854f1bad5d020b24f1ba5ea4033eaf
-
SSDEEP
12288:yYV6MorX7qzuC3QHO9FQVHPF51jgc+M+Vfig5fhLnqyTc7:BBXu9HGaVHS4gZlFc7
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.solucionesmexico.mx - Port:
21 - Username:
[email protected] - Password:
dGG^ZYIxX5!B
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
resource yara_rule behavioral1/memory/2300-0-0x0000000000E40000-0x0000000000F95000-memory.dmp upx behavioral1/memory/2300-19-0x0000000000E40000-0x0000000000F95000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2300-19-0x0000000000E40000-0x0000000000F95000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2300 set thread context of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 RegSvcs.exe 2228 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2228 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30 PID 2300 wrote to memory of 2228 2300 ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe"C:\Users\Admin\AppData\Local\Temp\ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\ΕΠΙΒΕΒΑΙΩΣΗ ΤΗΣ ΠΑΡΑΓΓΕΛΙΑΣ 56474.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-