Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe
Resource
win7-20240903-en
General
-
Target
57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe
-
Size
1.2MB
-
MD5
472c3b7e7c7ff8660eb4a4031429c110
-
SHA1
002706cd928985be1edb4b227f3735bf41386fbb
-
SHA256
57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399
-
SHA512
12d3c8787101ce649b868aa63a35e18acddcfc892fb4320360354686b1fb4d0b34c9cc9b41a13a318439fe9940df00c9627f7b0ef74f5d042575051be73d419b
-
SSDEEP
24576:Ju6J33O0c+JY5UZ+XC0kGso6Fab3UCZNOWYr:ru0c++OCvkGs9Fa7RZHYr
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs deblaterate.exe -
Executes dropped EXE 2 IoCs
pid Process 2040 deblaterate.exe 1808 deblaterate.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000016d13-8.dat autoit_exe behavioral1/memory/2040-20-0x0000000000BE0000-0x0000000000D16000-memory.dmp autoit_exe behavioral1/memory/2040-23-0x0000000000BE0000-0x0000000000D16000-memory.dmp autoit_exe behavioral1/memory/1808-31-0x0000000000BE0000-0x0000000000D16000-memory.dmp autoit_exe behavioral1/memory/1808-35-0x0000000000BE0000-0x0000000000D16000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1808 set thread context of 2792 1808 deblaterate.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deblaterate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deblaterate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 RegSvcs.exe 2792 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2040 deblaterate.exe 1808 deblaterate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2040 deblaterate.exe 2040 deblaterate.exe 1808 deblaterate.exe 1808 deblaterate.exe 1808 deblaterate.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2040 deblaterate.exe 2040 deblaterate.exe 1808 deblaterate.exe 1808 deblaterate.exe 1808 deblaterate.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2040 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 31 PID 2016 wrote to memory of 2040 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 31 PID 2016 wrote to memory of 2040 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 31 PID 2016 wrote to memory of 2040 2016 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 31 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 2168 2040 deblaterate.exe 32 PID 2040 wrote to memory of 1808 2040 deblaterate.exe 33 PID 2040 wrote to memory of 1808 2040 deblaterate.exe 33 PID 2040 wrote to memory of 1808 2040 deblaterate.exe 33 PID 2040 wrote to memory of 1808 2040 deblaterate.exe 33 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34 PID 1808 wrote to memory of 2792 1808 deblaterate.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"3⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD5d5ff273c67bf337b6c7a5fe50f3bb763
SHA1cdec165694b9173d9d23fa17eb0518f0597b6cf0
SHA25644d928169e1ba064ddf35a6b6212b6184664f008b920f0e4cdd5e941643700dd
SHA51287f923ee9be03c24aaada95934efd0ad7582947695434df9f2727549e1083de303ecc72b4bbe398fd1476a1f3a682d1bf0f21cc73693370139a1485148429fdf
-
Filesize
261KB
MD55640b94aeae5c17e2386783c6c3d4545
SHA1e4d287a77af5c0473bf0d3adadc97f0e434f7f2d
SHA2562317da619948a87bcff079bbdecb1f682bb3cecbd90a1fd08680d35cd18a4e6e
SHA512fe7851eeda03a05b5fab4de4371a7dc88abe4015a2a01de5c9587223197425e2e5132d043744ccfd5a293dec2de25ce5c28be3f8da6e35f2dd38e637de178404
-
Filesize
1.2MB
MD5472c3b7e7c7ff8660eb4a4031429c110
SHA1002706cd928985be1edb4b227f3735bf41386fbb
SHA25657e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399
SHA51212d3c8787101ce649b868aa63a35e18acddcfc892fb4320360354686b1fb4d0b34c9cc9b41a13a318439fe9940df00c9627f7b0ef74f5d042575051be73d419b