Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe
Resource
win7-20240903-en
General
-
Target
fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe
-
Size
924KB
-
MD5
e3d9142bc972b5c18cf65055d754730e
-
SHA1
9a901d247c4d70d427bc2361aa7ecf187754aaed
-
SHA256
fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096
-
SHA512
d4e5611347aafcc2b2ce1a9101f3c60ea1b4f839014fcdeea08aa3fe48291e48eacfa274514622477340a0f1722dfde00e17fabd3970dc305dc55d7163f9fb81
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCWKqSJfB480u10tc2n:7JZoQrbTFZY1iaCWopUu12n
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 3708 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3708 RegSvcs.exe 3708 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3708 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3548 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 86 PID 2624 wrote to memory of 3548 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 86 PID 2624 wrote to memory of 3548 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 86 PID 2624 wrote to memory of 5004 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 87 PID 2624 wrote to memory of 5004 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 87 PID 2624 wrote to memory of 5004 2624 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 87 PID 5004 wrote to memory of 3708 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 88 PID 5004 wrote to memory of 3708 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 88 PID 5004 wrote to memory of 3708 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 88 PID 5004 wrote to memory of 3708 5004 fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe"C:\Users\Admin\AppData\Local\Temp\fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe"2⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe"C:\Users\Admin\AppData\Local\Temp\fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\fc62e1f8a06c83ac2f02300784042f52a8f071466843f9946724ff6f99ebc096.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5c6ecc83dc05128f90fd21ccff8e1051e
SHA176882218313a49bd41b8bbfba863e5f6915dab79
SHA256991ee9900c3f80633c53f46199c2afcf754f355cd56f02705b5ab171937ca19c
SHA5123553208d5fc6afb13c547a617b7305015587c7a0c34256138f8ebe7e4382184c28326fef080764e799138ba85d7eb3e19efcfac57b69a1d6116733661c7fd877
-
Filesize
140KB
MD5b40544bcde92db4ebf377847d2154842
SHA1847a95afbaa2b98eb5f2a32cf171baa1c204036a
SHA256b7ea4dd59f92a21895f9e9075f84646cb40ebcac60e341e6fbff73836b3162c1
SHA5124693fcbba67fdbe18b0d7e60959eb4d67e828a480f7efb060e1d8bb586fe79c31979d4141a0d1b03736ab4db292fd6cdc018d629ec7b63e101463f54d5ee704f