Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 01:57

General

  • Target

    f53ac19e1eaa2c09cd5d01fdf87d548fa6f93e02fe8562971a3b836675c0187b.exe

  • Size

    1.6MB

  • MD5

    e90237d59aa816120d3a2fe9ddb1536b

  • SHA1

    a6876e3fdbeffbdc55db62327cd2dc328915dcfb

  • SHA256

    f53ac19e1eaa2c09cd5d01fdf87d548fa6f93e02fe8562971a3b836675c0187b

  • SHA512

    9a426e35bd853796cf8105c5f40bd5590eb42e0fbd662527ff39315bb965067984710c01f0c61e562cf2e7cbcd2f9be392d2e151c96c3b3a43151376c0274994

  • SSDEEP

    49152:OAodtaG9kS2U84B+FLan9k5TRM9zlIVj6:y/B1X

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f53ac19e1eaa2c09cd5d01fdf87d548fa6f93e02fe8562971a3b836675c0187b.exe
    "C:\Users\Admin\AppData\Local\Temp\f53ac19e1eaa2c09cd5d01fdf87d548fa6f93e02fe8562971a3b836675c0187b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\regedit.exe
      "C:\Windows\regedit.exe"
      2⤵
      • Runs regedit.exe
      PID:2368
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
      2⤵
        PID:2336
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1124
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

      Filesize

      579B

      MD5

      f55da450a5fb287e1e0f0dcc965756ca

      SHA1

      7e04de896a3e666d00e687d33ffad93be83d349e

      SHA256

      31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

      SHA512

      19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

      Filesize

      252B

      MD5

      60a5977441d90530c8c65848ed386d6f

      SHA1

      f79e2986f6f1db0224dc93aa94a038933646f728

      SHA256

      55a2c277ce9395f26146573d2905a69a2ab8c091e258272233563a0cd9daaf9c

      SHA512

      11ab0fab6bd41914573bc23579b2b61000c99f744eafad6727c538419bd8d86ea886f838b956607958216948d04d53671ed3577bf1d7a5f2e1ad428cae348935

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bc728049b1e71bfddf2f07b1e1d6f3b0

      SHA1

      0c952734ffa6fd329b2a4dd73253a4a3bb4a2440

      SHA256

      2794c8ffd1092a30f07674cbcde03672966c5fd4e9831738851706dbc7beaabc

      SHA512

      e5acc0d24f4e99b9bd29f8e2b4aa11cdfb21b5e33090194ccffdff859e567728c585e5ef829a78aea0ae928367a62b8730eaeb5239d43dc5ceee0a0ec5767d97

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9376627cf19508ed1596179770526244

      SHA1

      1f6c1789804c22d1f763e3bdfd728f895c662b00

      SHA256

      e20cbac56627a28f28d4403c3d0fde5b4f65b190899c2da581cae9d83aa878c5

      SHA512

      2ea2d8fdccf64a605d5e20e7f83b6c7e07c4149083bd5f36459f56b5bd523d2d5236d7d8074aaa81c09346fd131ab4e48c01ff1b6284d56542ba94e47e3b059c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8bfa056e481fc97c43e61bec648e7fa0

      SHA1

      ab0cdadd47e0863370099f2c00c935dd315cec48

      SHA256

      05cd1697bd39d1f9797f3561349ed6a1fd98fe4bbbd12b82b609975fb0817dab

      SHA512

      063ddff2200c12bb0fa1db434d7e60014c154720e93fe434eba984245f76dc2e539a03706449b4337a6b24689664018838c31f72e721e01654cd56d01af85b18

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3ce3402d3efe8d29579edd29a1270411

      SHA1

      fd8551720750678efa61526d5e55f8c4df2cd62e

      SHA256

      65646a4874544feed4ddfc4fab22ed38a83d199d1a1408314ad8957722319734

      SHA512

      4432a1c2629f7bdbece551ab9d91878d97a95b6c431d25114d3a4e12b442c527573930cc294091933091e63caf6dc5f5b506ddaf438c8ff7746c2116847db558

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53aff7e672330cb4155f6a5cbab11d25

      SHA1

      3424538da86b4141fccea02e0998589091fb8540

      SHA256

      1977076f0e0bc4fec0f2912e40186e991ac7f5843a7d06802a28fc8d7daacefb

      SHA512

      57276675d71c5e41982c068e64e849d2c726e2d4a65d14a32ed8c6acaa6843f897536406b22015f19eafa7995e4943b4d08cc072b9144c9aef34a7cd04c3985e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      55785195e010fb21f81ef6135df9c391

      SHA1

      d65bc4670e00b838f0d46064737651608b059758

      SHA256

      b33b864226034e30a3638d96a453d45a9e20aeeb3843ac199eb138f39bdf27ed

      SHA512

      3f9adc5deed0d08e4b26c416318f1a4eb5a539ab318f09874832f21268fab92a19eddec664bf2cf06fd2849a13b3ed3efff722d98653f98e80819bdd952eec53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef63a95cacb8ad89a4734eeabade21b0

      SHA1

      8e44406803baff86068fc89c34959afbb1982c41

      SHA256

      d799a008d7a8fb311538ed7b3aa638bbcd433c0387b94102fc5fe865ed232a8e

      SHA512

      4f7bd29e58fab2421bd222d077de0127114e6acbfbd4af7a8f9aa646f4bad7e86ab71c5b32b80254a9a77775c09de117cba972964c7b413cf83da4bb8657ed19

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2ce100f48e318fe3ea1039a1a1b0e984

      SHA1

      da78493ebda6becf2ca7e150210ff9847d2d9b81

      SHA256

      f216eab87e400b2251aec20ac89171166bbf8bdebeb0db79d510dd114958ca8d

      SHA512

      4855de6e89a450c4b7e8688bff1f93e3ea4d8fc02ce2ae22273c6d01f8b20990f1c4a84e146b9f4ebabb4541f337ac143d2d93336b42cbba3cad9e7503cf74d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      52d2f435c9c3a61784b3d0ca01ff1a5b

      SHA1

      437f72c0adf08082eaa7e8e099f2c77197f4b34d

      SHA256

      3457797fe9f41090bf2151aa62fc9be0594ddcfb390c7c8e11bc3ab66d495e79

      SHA512

      d96d19c53c41104efc9ad2b96e1fd696a78aaf95166c4f8cfb3b7add91365646b56e4848f3eb476c5491e5fadf37267c1e62aa6fcb3d04868ebd3e0c7b6aa5be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      917055578ef0ee76a843f57d93d13580

      SHA1

      1da52d730a54cd7d143d54b6b7174fc1b2739476

      SHA256

      d3339890930eb7de4a8588bb1069e1cdbe2cc5b279277899705c03f925d4ac81

      SHA512

      b8ff8b7ab0b0bf1bebf50af24d2041fb5f64315ed4749d3f8ec094976b7c1883c7140c173c395a5d86bed66198f38f9cbe37423378e4414f4042da79b070ad36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      309d17d77a280904f6fd9603a32d8383

      SHA1

      26a1465120b98b479a7961db188085c73cb9ae24

      SHA256

      6ed86d6f63356381af0d4a595c7763283623d2c404ca81971d984a0db390ed9f

      SHA512

      f353c16d35810e1f53c5cfbf7a289cc5c9bed11c19f98101d1fe0344dda78a6874a98eab5ab1137c66f5121ea619812fa1596b399b81ca56a1b9176293524c2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d875a963aa23632f301e3b4b9139cdb4

      SHA1

      04c62ebe7d01f91e67e154dd17bc954273381838

      SHA256

      0c7e482a867005910e86894a993294741eaccf949cb5cbf3b6b95b36a3a7d359

      SHA512

      746e6f9da6a08e064c09126fd2fdb4e98a15ed366e370c62341867b66ac47ead47d3046a255892ad9aab8b953cfe5b87567f0b3365b5f4dc9f718fd199945989

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      07fda7fcbc5d7213de1db65c531572e0

      SHA1

      3ed46598d31616a7011df46f258a02edb872104b

      SHA256

      5eedcaf6c13462a229b69405ac7838296d0a3374533f034692497700c003e9a5

      SHA512

      0558ee2952ffb6b4f50c821a69cd828c8c7ada1226429f6b735ae52cf2eb6ed5a6c9153efaca18c4fe2264234039e28b76c3db469cba4bd917e0c7d681fefeaf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      de3f6eadddbe0eccdddb6b5250dae44e

      SHA1

      7934a6106bb27387352367c00ea03f62ea2d3da1

      SHA256

      0c2ebcefdd3db66fb1d44a777d867c93bcb7d7b947ff289b30bfb6efeb09e6f9

      SHA512

      5960dd34ee6106da35dc33b0638873206f363ff2e34d1588b1822d2b5d1e4ae8f9f24e2461f5f38a2f8d29909ce8e95470909860c6ed80d019f2964f4a56731a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ff6c65263f5faeb5d1767155b737e17

      SHA1

      32f634d1d4224d8dfc4e0237a19ea82f89598fd2

      SHA256

      c9825edb3eee4df61d687082e010d7f07c1c651f965a603a80536bbf4ed19855

      SHA512

      c234ce4d18476ff28a9bdd7087ca280e24bbbed5aba84a1cdc42ded53ca85cbd273a9bf83110c176eded443e2fc52f71cb720b5d9e8d37ff04142762ad48429c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0be50bebed0f0cf04bd96c1cdb926a26

      SHA1

      0ead1ea88fd82cf1109628bab4f96bd204db3b2b

      SHA256

      321b07c818afe03f74284bebf5b34f15f68a31bffdc32d7c6d427875cc35cdff

      SHA512

      2f67838b6c615d5a8e3bafc95de419c0537534e05cf3c48279531cd6e103770484f888752734ebb61b1405334cffc8fc22389839c8217c06651157b6f5b03bff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      56a581db763221318bce415933533a1d

      SHA1

      25bbf4dfbad73573b04476544a06391d0eb46b8d

      SHA256

      af4229a695e32d867723f6314167399fbdeaa3a758ac13b5f9390d2013d8951e

      SHA512

      acb204d88891ee265bf410c27dfe3f3f66757b266577bbc0f113de99a1c67f357824907d666f7a36325e76d867916083607cc622817379ca87bd3ec868ade8fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b954b7f2f579a2a79d69be5477e39fe5

      SHA1

      673a6b48054152ed7224b41cf0ad42d4f66cb133

      SHA256

      a87bd88e52067fb61da5cab0ec8699dd8faa6d3b0d72b0031ad6d4b9ab49b307

      SHA512

      8fc39f0aa46bb4ce5bb4e053bebba09cf8a41326addd77234b677afbba751679bba4d2fa6e1558cfab783a343596eca1f6dd11d17ab3688d23a2c6a9ddd25177

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ffc66a348fa7d4e2a551b906e95963a7

      SHA1

      706c326b6e475776b6006cbbf861f078f02f4785

      SHA256

      6fc44215831c707fe61f56e50ac6812551bd0c430ff01c5652e2b8b805dfca6f

      SHA512

      75c3f6de9826d54f165667764e69c51ebafe0a8e57d53ca0f71f9e854bf5b1bad41c8f775768f4fa4ae6460121e67ca9a32d0e228552c25d5475c61c97980989

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      429d675181e68d01002677b9e907d09a

      SHA1

      d9c2cfbfb1ee6f44f5d124cdf28090999ec3bce0

      SHA256

      50256e03451e1c01e937d883ec68af8196b537acd1f12303b974da367682e132

      SHA512

      210aceb6cf9366fcbcd77f746ddb606be466f1fe2bdaf504ca0059bc4d769394c9703516c3252ddab4c7cea5455375f0d73c2fc19fc7e972706268ba4f7a57a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      77f76862dc46ebea2506dbf739fca6f4

      SHA1

      bafef96549c4e657360706abb7eb7224e4384ad0

      SHA256

      83c448a9f94051b4b5dee0f1ff713e6269f66f994dbdf1b68bf8cc93c5e8504b

      SHA512

      8d30b29aeadc7536f16640e5b00221af1ff80d7bf0165dccc3d23b420b7f8f1d1e6af670fd46747aaef0a5f32b4cd8393f5a20ca963712023f35e5a5843830ef

    • C:\Users\Admin\AppData\Local\Temp\CabD5E7.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarD696.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/2328-0-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB