Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe
Resource
win7-20240708-en
General
-
Target
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe
-
Size
1.3MB
-
MD5
f3dde6c8bc9bfb2c6ade147f57072fd8
-
SHA1
20806b6ab0070ed41d131b699c75b652557b860e
-
SHA256
51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
-
SHA512
58c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLF+DtPR6xcLnBJR+CjuCd8SiN2mjJEH:f3v+7/5QLF+DtRUSDsC6Cd8Sr+eH
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs name.exe -
Executes dropped EXE 1 IoCs
pid Process 4736 name.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 api.ipify.org 15 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000400000001db32-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4736 set thread context of 2556 4736 name.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language name.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2556 RegSvcs.exe 2556 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4736 name.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2556 RegSvcs.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4736 1780 51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe 83 PID 1780 wrote to memory of 4736 1780 51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe 83 PID 1780 wrote to memory of 4736 1780 51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe 83 PID 4736 wrote to memory of 2556 4736 name.exe 84 PID 4736 wrote to memory of 2556 4736 name.exe 84 PID 4736 wrote to memory of 2556 4736 name.exe 84 PID 4736 wrote to memory of 2556 4736 name.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe"C:\Users\Admin\AppData\Local\Temp\51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\directory\name.exe"C:\Users\Admin\AppData\Local\Temp\51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\51787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f3dde6c8bc9bfb2c6ade147f57072fd8
SHA120806b6ab0070ed41d131b699c75b652557b860e
SHA25651787074975a0ed0e119e8a13534bb7b161b2688bc2f7ee5698982cefd74dcd9
SHA51258c512a61eccfb112322b5d65342aef412a3825ef04bf0f7c08b26b4d516826c6d3ff2d2dec82456c862e81ebad6f25445e2c7a46f506e80252b7b46e7e42d02