Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe
Resource
win7-20241010-en
General
-
Target
cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe
-
Size
444KB
-
MD5
d31b2440677629f677088e97981aa638
-
SHA1
43b91b1c7b064294440f9d944166a65e0db48e14
-
SHA256
cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1
-
SHA512
3598327a3827742d67f1794acf1eda28ded22ed7ac92cc69de7866b20903a97da6782b8908650e83825f290f900518157f398485f45f9f5c6ff46bf5c885b954
-
SSDEEP
6144:HoPu6sbxtqQwDCVmpXdaZwVGnESPmP2yyT5lq1aR8a4XZLCWR7pUZ:PjqYZwV3SPm7yT5Qw+mWtaZ
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 3 IoCs
resource yara_rule behavioral2/memory/2420-10-0x0000000000370000-0x00000000003BC000-memory.dmp family_agenttesla behavioral2/memory/2420-15-0x0000000000370000-0x00000000003BC000-memory.dmp family_agenttesla behavioral2/memory/2420-4-0x0000000000370000-0x00000000003BC000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 2420 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 84 -
Program crash 2 IoCs
pid pid_target Process procid_target 3516 2420 WerFault.exe 84 2264 2524 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 444 schtasks.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2524 wrote to memory of 960 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 83 PID 2524 wrote to memory of 960 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 83 PID 2524 wrote to memory of 960 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 83 PID 2524 wrote to memory of 2420 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 84 PID 2524 wrote to memory of 2420 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 84 PID 2524 wrote to memory of 2420 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 84 PID 2524 wrote to memory of 2420 2524 cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe 84 PID 960 wrote to memory of 444 960 cmd.exe 89 PID 960 wrote to memory of 444 960 cmd.exe 89 PID 960 wrote to memory of 444 960 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe"C:\Users\Admin\AppData\Local\Temp\cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\5266164ba3264381885ad8ba377bd237.xml"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\5266164ba3264381885ad8ba377bd237.xml"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:444
-
-
-
C:\Users\Admin\AppData\Local\Temp\cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe"C:\Users\Admin\AppData\Local\Temp\cf9b22d4b9bd24c826d360840e3fba7d40ce49d636902980655c328cb118c1d1.exe"2⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 3963⤵
- Program crash
PID:3516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 7762⤵
- Program crash
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2524 -ip 25241⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2420 -ip 24201⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ab151cf827ce160870b6fda1d1a68ffa
SHA116e5c96c02a16cfde578c911b2a85668fee77551
SHA256e1e54d3e7a88f3bfd1cf0ee27688cdda8e22d8a5d23fe85931c9549a010a01ba
SHA512ad4ae20245aef69bd610199fcf1ae3a9e0feee428abb75aee05b08a0dd8a5e13406471a7309d9f4048437acb31ba58571d35e82292fdf084b15e261d69960dd8