Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe
Resource
win10v2004-20241007-en
General
-
Target
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe
-
Size
554KB
-
MD5
81f20454fa574359c7d5c1782379de4f
-
SHA1
13da3f713d00097a38358cd52f0aa78e32dd97d7
-
SHA256
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4
-
SHA512
847b02fbaa0edae04068b6499f24bb6065b0b8356f7172297390c325c233593450554ff1832888111448eb9b60557ab72f784492b7e310d274016d6ab385c138
-
SSDEEP
12288:BzpH6Ibw8eGm9/5srz16kfmTG+gkodqJFTPp:BVdbw8eGm9hsn1cG+zEq1
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ananthahotels.com - Port:
587 - Username:
[email protected] - Password:
india225@#
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2748-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-22-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-20-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2748-12-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exedescription pid Process procid_target PID 2212 set thread context of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dw20.exe7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exeschtasks.exe7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exepid Process 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exedescription pid Process Token: SeDebugPrivilege 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe Token: SeDebugPrivilege 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exedescription pid Process procid_target PID 2212 wrote to memory of 2736 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 30 PID 2212 wrote to memory of 2736 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 30 PID 2212 wrote to memory of 2736 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 30 PID 2212 wrote to memory of 2736 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 30 PID 2212 wrote to memory of 2808 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 32 PID 2212 wrote to memory of 2808 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 32 PID 2212 wrote to memory of 2808 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 32 PID 2212 wrote to memory of 2808 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 32 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2212 wrote to memory of 2748 2212 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 33 PID 2748 wrote to memory of 2976 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 34 PID 2748 wrote to memory of 2976 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 34 PID 2748 wrote to memory of 2976 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 34 PID 2748 wrote to memory of 2976 2748 7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe"C:\Users\Admin\AppData\Local\Temp\7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qLfHHhQPSUpA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6BAE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe"{path}"2⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\7c9e768ae472510baf3205e4d14dc2cedac6b88382ad19771090d9dbde53bdf4.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5163⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561a12cce516a25870886cebf33a4f626
SHA1c3ab4dac4543c4f40c11efde7fd056e8e39144ef
SHA256e8381d62cc98e1789d701a8423c372ef0a7ee567d169d427f7cc7a8a2e939d38
SHA5128cd715a305a731a420768debb69a7f5b62e7f60c0f71341263d6e857227a2cb5cd541f3ef6b58e138bd676c6cd419ab4f2e714ce9be9ef917ea497c49b711ee5