Analysis

  • max time kernel
    104s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 03:33

General

  • Target

    9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad.exe

  • Size

    234KB

  • MD5

    22b24e4a81e510abdbeaa31bc0ab6502

  • SHA1

    3790b4956a90a22d3bc2764b848506fbcb666d5e

  • SHA256

    9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad

  • SHA512

    6853dca9121698ed7a48582ef44d2821d4a77b2d0fad9a1eb9f20174de4789c281a6b1f955c1360d174798dba95196bd855d63a30e653be08a2e9939285cad78

  • SSDEEP

    3072:flHkOmyuyGbrtNUxDGcV5bA7otIu4o6KM0V5lYOwY+P:flHbmyuyGNNUxDGcV5bA6V6K5zwn

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dai-logistic.co.id
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    domestic1234

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad.exe
    "C:\Users\Admin\AppData\Local\Temp\9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/436-0-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/436-1-0x0000000000380000-0x00000000003C0000-memory.dmp

    Filesize

    256KB

  • memory/436-2-0x0000000005360000-0x0000000005904000-memory.dmp

    Filesize

    5.6MB

  • memory/436-3-0x0000000004EB0000-0x0000000004F16000-memory.dmp

    Filesize

    408KB

  • memory/436-4-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/436-5-0x0000000005CD0000-0x0000000005D20000-memory.dmp

    Filesize

    320KB

  • memory/436-6-0x0000000005DC0000-0x0000000005E5C000-memory.dmp

    Filesize

    624KB

  • memory/436-7-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/436-8-0x0000000006380000-0x0000000006412000-memory.dmp

    Filesize

    584KB

  • memory/436-9-0x0000000006330000-0x000000000633A000-memory.dmp

    Filesize

    40KB

  • memory/436-10-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB