Analysis

  • max time kernel
    104s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 06:30

General

  • Target

    9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad.exe

  • Size

    234KB

  • MD5

    22b24e4a81e510abdbeaa31bc0ab6502

  • SHA1

    3790b4956a90a22d3bc2764b848506fbcb666d5e

  • SHA256

    9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad

  • SHA512

    6853dca9121698ed7a48582ef44d2821d4a77b2d0fad9a1eb9f20174de4789c281a6b1f955c1360d174798dba95196bd855d63a30e653be08a2e9939285cad78

  • SSDEEP

    3072:flHkOmyuyGbrtNUxDGcV5bA7otIu4o6KM0V5lYOwY+P:flHbmyuyGNNUxDGcV5bA6V6K5zwn

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dai-logistic.co.id
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    domestic1234

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad.exe
    "C:\Users\Admin\AppData\Local\Temp\9e132562718eeb451808cfb21548977417230874a3e634be1b44962d2cb245ad.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2288-0-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

    Filesize

    4KB

  • memory/2288-1-0x0000000000160000-0x00000000001A0000-memory.dmp

    Filesize

    256KB

  • memory/2288-2-0x00000000051D0000-0x0000000005774000-memory.dmp

    Filesize

    5.6MB

  • memory/2288-3-0x0000000004C90000-0x0000000004CF6000-memory.dmp

    Filesize

    408KB

  • memory/2288-4-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/2288-5-0x0000000005980000-0x00000000059D0000-memory.dmp

    Filesize

    320KB

  • memory/2288-6-0x0000000005B70000-0x0000000005C0C000-memory.dmp

    Filesize

    624KB

  • memory/2288-7-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

    Filesize

    4KB

  • memory/2288-8-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/2288-9-0x0000000006030000-0x00000000060C2000-memory.dmp

    Filesize

    584KB

  • memory/2288-10-0x0000000005FF0000-0x0000000005FFA000-memory.dmp

    Filesize

    40KB