Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 06:23
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
sdss.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
sdss.exe
-
Size
1.1MB
-
MD5
4459a7eb4a040e16e462aed9face5033
-
SHA1
a6c388afbcfd0a2ae2810205be37c354b15feb86
-
SHA256
dcc72f90c1d3aac382ba8965c68109986771562f49d4112c5be1a0e9b645f621
-
SHA512
225ffbea03ace2d7a0943864c84ab41600266741b104f0e3a304b96f13a99476a75111f07e0ac906165a2d24fac3ceba60dadfac5a2ecaf8f73c4182a7c586f8
-
SSDEEP
24576:WfmMv6Ckr7Mny5QbMp1LpiEYKRh/+EeNwEh:W3v+7/5QbMp1LpiEn1+EIwEh
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.pgsu.co.id - Port:
587 - Username:
[email protected] - Password:
Vecls16@Vezs - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 2596 3012 sdss.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 RegSvcs.exe 2596 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3012 sdss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31 PID 3012 wrote to memory of 2596 3012 sdss.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\sdss.exe"C:\Users\Admin\AppData\Local\Temp\sdss.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\sdss.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2596
-