Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe
Resource
win10v2004-20241007-en
General
-
Target
7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe
-
Size
1.2MB
-
MD5
a7a9d52d9dc472157c5c1dfb50e3b1e0
-
SHA1
c9174cd635588d24f89596a1f5c91e4319022a32
-
SHA256
7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f
-
SHA512
f41cea1b8861e5b76eb3b7b045b10a8f3a951122b2c397e9e4e9c7ca2432c2b8f2a6687eb6089eea7de2f300f128128b034178f3b61d3cb48b0016d4323783e6
-
SSDEEP
24576:Mu6J33O0c+JY5UZ+XC0kGso6FaNYNtekH+DieUa0DsWY:Wu0c++OCvkGs9FaN+tekeDiqMY
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\yGbzOMp = "C:\\Users\\Admin\\AppData\\Roaming\\yGbzOMp\\yGbzOMp.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3064 set thread context of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 PID 3064 wrote to memory of 2356 3064 7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe"C:\Users\Admin\AppData\Local\Temp\7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7bf952d355f80dc19b83164adaca95e41edd43a9e00e892a55293559a0b8f73f.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD55c1e42980ef05fdda71cbc7f5411993c
SHA18b4d96e987b46ec313fbb3ecda9828594c2736b9
SHA256b213bc21f2b728a55c73afaa74aa287025aa13662c57b0a399f822f8148fd041
SHA5129ad7172ff0d19f9fc70437d3627d86fa6467fa46ee6964867e08f25e723f980f3a450831025c19faa1e9666b2387e2800cd9a32bc388e1a698c2023e0d748217