Analysis
-
max time kernel
94s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 01:54
Behavioral task
behavioral1
Sample
e4abeca3f1e138479cda142530fbc810N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e4abeca3f1e138479cda142530fbc810N.exe
Resource
win10v2004-20240802-en
General
-
Target
e4abeca3f1e138479cda142530fbc810N.exe
-
Size
585KB
-
MD5
e4abeca3f1e138479cda142530fbc810
-
SHA1
5b010c25a6b4702d6d0ea9c48d2a3339de5d5182
-
SHA256
b50fc7113a6c52967913e5bada3755364af76c2188ed621af5f23c3669648425
-
SHA512
93b8dea3bc03d88c1ac6e6b0e171f3db2153f73c139dc513b6ee16c74f4499461e92cf06bf2421fef2463f0441f8db655c1c4ae38c2c1705fe805035e31a5ab3
-
SSDEEP
12288:yYV6MorX7qzuC3QHO9FQVHPF51jgcdF++2Jw4THc7E6mVIE:BBXu9HGaVHWxJwGHcg6mv
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Grinnellia.vbs Grinnellia.exe -
Executes dropped EXE 1 IoCs
pid Process 2500 Grinnellia.exe -
resource yara_rule behavioral2/memory/3088-0-0x00000000008B0000-0x0000000000A01000-memory.dmp upx behavioral2/files/0x0002000000022d12-15.dat upx behavioral2/memory/2500-16-0x0000000000040000-0x0000000000191000-memory.dmp upx behavioral2/memory/3088-19-0x00000000008B0000-0x0000000000A01000-memory.dmp upx behavioral2/memory/2500-36-0x0000000000040000-0x0000000000191000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3088-19-0x00000000008B0000-0x0000000000A01000-memory.dmp autoit_exe behavioral2/memory/2500-36-0x0000000000040000-0x0000000000191000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2500 set thread context of 4136 2500 Grinnellia.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4abeca3f1e138479cda142530fbc810N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Grinnellia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4136 RegSvcs.exe 4136 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2500 Grinnellia.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4136 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3088 e4abeca3f1e138479cda142530fbc810N.exe 3088 e4abeca3f1e138479cda142530fbc810N.exe 3088 e4abeca3f1e138479cda142530fbc810N.exe 2500 Grinnellia.exe 2500 Grinnellia.exe 2500 Grinnellia.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3088 e4abeca3f1e138479cda142530fbc810N.exe 3088 e4abeca3f1e138479cda142530fbc810N.exe 3088 e4abeca3f1e138479cda142530fbc810N.exe 2500 Grinnellia.exe 2500 Grinnellia.exe 2500 Grinnellia.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3088 wrote to memory of 2500 3088 e4abeca3f1e138479cda142530fbc810N.exe 87 PID 3088 wrote to memory of 2500 3088 e4abeca3f1e138479cda142530fbc810N.exe 87 PID 3088 wrote to memory of 2500 3088 e4abeca3f1e138479cda142530fbc810N.exe 87 PID 2500 wrote to memory of 4136 2500 Grinnellia.exe 88 PID 2500 wrote to memory of 4136 2500 Grinnellia.exe 88 PID 2500 wrote to memory of 4136 2500 Grinnellia.exe 88 PID 2500 wrote to memory of 4136 2500 Grinnellia.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4abeca3f1e138479cda142530fbc810N.exe"C:\Users\Admin\AppData\Local\Temp\e4abeca3f1e138479cda142530fbc810N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\juvenile\Grinnellia.exe"C:\Users\Admin\AppData\Local\Temp\e4abeca3f1e138479cda142530fbc810N.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\e4abeca3f1e138479cda142530fbc810N.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD58100d54cd1da2d955aec2442330b9a3a
SHA1b56fbf35202ebf525ff736d7844ab285b9193c5a
SHA256295ef8d029e2ba16fccc828745d7f260ab4cea90ab2c01094b85e0bcbf0c17cd
SHA5124d46527585f0b908b60993e3c69ba5fe7fec84ebcfb69eaa842d6fc7486f0f00462542d7116b4b04032eaad9edd555f50e765415e67c9e86da0e966c6c0cf243
-
Filesize
203KB
MD50f0e24395c2e1a1042f0ae0cb9808b30
SHA164eb183637e19f0e81d58fe3f563a33b1db761bc
SHA256ec2be3d8ca3919ff410f92468a94f348783853cc75cc2c078ba75748f1ae0ff1
SHA512a044c8c063588dd7c7652f6a7b7b547818770002894da658c969a225c509d29d8d321d43dd8a9dcb19624fac12a77cc3d5271c0cb409ba668768f06984d20128
-
Filesize
585KB
MD5e4abeca3f1e138479cda142530fbc810
SHA15b010c25a6b4702d6d0ea9c48d2a3339de5d5182
SHA256b50fc7113a6c52967913e5bada3755364af76c2188ed621af5f23c3669648425
SHA51293b8dea3bc03d88c1ac6e6b0e171f3db2153f73c139dc513b6ee16c74f4499461e92cf06bf2421fef2463f0441f8db655c1c4ae38c2c1705fe805035e31a5ab3