Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe
Resource
win10v2004-20240802-en
General
-
Target
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe
-
Size
1.4MB
-
MD5
5ebf4fc104570b9074cf54840814513a
-
SHA1
20fdbbcc1a274f44f7f7458f609c7d0758f5370e
-
SHA256
d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404
-
SHA512
40f090006c9f6ab924aa80fa245f12f2b8298d21b5a284fd3d1b917dd2d9f95102fb74bc9273f9c3f3882a787286184bd5f1159a5dbfe9eb408920a7fa700460
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8afv5vPHMq0F/IW7m9T:KTvC/MTQYxsWR7af1CIwm
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.vbs system.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 system.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016d47-14.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 2744 2224 system.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2744 RegSvcs.exe 2744 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2224 system.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2744 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 2224 system.exe 2224 system.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 2224 system.exe 2224 system.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2744 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2224 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 31 PID 2016 wrote to memory of 2224 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 31 PID 2016 wrote to memory of 2224 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 31 PID 2016 wrote to memory of 2224 2016 d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe 31 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32 PID 2224 wrote to memory of 2744 2224 system.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\directory\system.exe"C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5cd5ddb4993df5199ca4ab3202dca2bc0
SHA15f24ef82f9a0ad9b8e4d8d0a82bb5cbfc7eccb94
SHA256e5f8566332f69d6f5372205c195ffd8d27186f05432d25cc6318373e47d99c54
SHA512e3777f32960551d54a07e4ad9adb1247fb16605c381ea842c1766129e75ce65af6e1fa9939b653692a2ca5221e514d4a235245dcdb34fc82ae88b4c72b88bda4
-
Filesize
28KB
MD5f347cfb4a51564404350e6b76698992f
SHA1e3b8a1a0f71a8fac13e1e5824a927d91ad7b9266
SHA256a34fb7e27db35a62bc83db780e79487be8ac81cd2d1f6ad850ab02ca5476f8be
SHA5127254c951414ffc87372ab165fe714b66a9ecdcc695fadfe5848fc4bdb6d0a4bbcce8064ca6e8d9abee1ff62d257a02301bfeeb6d63434bea6bbe1f97e5f20c97
-
Filesize
1.4MB
MD55ebf4fc104570b9074cf54840814513a
SHA120fdbbcc1a274f44f7f7458f609c7d0758f5370e
SHA256d6e12ca72ee501a41c85d8aeee6ee15bd6f203622a3fd875996bebb4115fb404
SHA51240f090006c9f6ab924aa80fa245f12f2b8298d21b5a284fd3d1b917dd2d9f95102fb74bc9273f9c3f3882a787286184bd5f1159a5dbfe9eb408920a7fa700460