Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
Confirmacindepagoshrunk.exe
Resource
win7-20240729-en
General
-
Target
Confirmacindepagoshrunk.exe
-
Size
204KB
-
MD5
5f249a857aa4ec0d7811cbe49b1eac0e
-
SHA1
9bc2fed4cf1f677c009ba9c0c224e15a07ee8dd4
-
SHA256
e97a53902ccc623ff61147e3b7cb7e9abf77e8a61a401a317891ffaf73a7338a
-
SHA512
021890218f651a97b7f2d3a490def666e3a70a55e40355a91ce912eaff80c60728a582128220d8ccc07653d6a131f6bef42892907153b6f25b52ecce22fbfc5c
-
SSDEEP
1536:SD8LRJrCwGizMmnLU/lmOfsxdPTWQ7ZnbXnD630VD1:SQdJrCwG7Wo/lmOfsxdrWQFXWEVD1
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6828335029:AAHOq6iD_8Eg5u6FhmWF0NHPcKj1jLGtRk4/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3688 set thread context of 4640 3688 Confirmacindepagoshrunk.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Confirmacindepagoshrunk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4640 RegAsm.exe 4640 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3688 Confirmacindepagoshrunk.exe Token: SeDebugPrivilege 4640 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82 PID 3688 wrote to memory of 4640 3688 Confirmacindepagoshrunk.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Confirmacindepagoshrunk.exe"C:\Users\Admin\AppData\Local\Temp\Confirmacindepagoshrunk.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-