Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 00:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
PO.2200041757.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
PO.2200041757.exe
-
Size
749KB
-
MD5
c3ec4a8aa7918704724356d0a46bf4e4
-
SHA1
beffae358f9b2bcca9d969261c99aa2f7e553a91
-
SHA256
db8d3c32ee69788198baaa3b9ee3b2dd7c2a18ae090b6c336c0fd89d6c73bd21
-
SHA512
a287a753d098c4a55950f58443dc4e21ed3b504f7e3ad41a707db839dc547385fda9d8fe937f1ea6fd49a0c0378438fc106ab5332dafe898444e2378e06cd787
-
SSDEEP
12288:ZDI9QaV4j0frPvO1ig4jBqA+50kC/Gpbls90EJyFVSlQoseFmD0DpG3IS:Zk9XzPqCqANkUB9hYVqseFvA3
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
server283.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
L8OYn!$gh;8r
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/3032-15-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/3032-13-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/3032-8-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/3032-11-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/3032-7-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 3032 2272 PO.2200041757.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.2200041757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.2200041757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 2272 wrote to memory of 3032 2272 PO.2200041757.exe 31 PID 3032 wrote to memory of 2628 3032 PO.2200041757.exe 32 PID 3032 wrote to memory of 2628 3032 PO.2200041757.exe 32 PID 3032 wrote to memory of 2628 3032 PO.2200041757.exe 32 PID 3032 wrote to memory of 2628 3032 PO.2200041757.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.2200041757.exe"C:\Users\Admin\AppData\Local\Temp\PO.2200041757.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\PO.2200041757.exe"C:\Users\Admin\AppData\Local\Temp\PO.2200041757.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3883⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-