Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe
Resource
win7-20240903-en
General
-
Target
57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe
-
Size
1.2MB
-
MD5
472c3b7e7c7ff8660eb4a4031429c110
-
SHA1
002706cd928985be1edb4b227f3735bf41386fbb
-
SHA256
57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399
-
SHA512
12d3c8787101ce649b868aa63a35e18acddcfc892fb4320360354686b1fb4d0b34c9cc9b41a13a318439fe9940df00c9627f7b0ef74f5d042575051be73d419b
-
SSDEEP
24576:Ju6J33O0c+JY5UZ+XC0kGso6Fab3UCZNOWYr:ru0c++OCvkGs9Fa7RZHYr
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\deblaterate.vbs deblaterate.exe -
Executes dropped EXE 2 IoCs
pid Process 428 deblaterate.exe 1764 deblaterate.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c6d-9.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 1440 1764 deblaterate.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 3204 1764 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deblaterate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deblaterate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1440 RegSvcs.exe 1440 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 428 deblaterate.exe 1764 deblaterate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1440 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 428 deblaterate.exe 428 deblaterate.exe 428 deblaterate.exe 1764 deblaterate.exe 1764 deblaterate.exe 1764 deblaterate.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 428 deblaterate.exe 428 deblaterate.exe 428 deblaterate.exe 1764 deblaterate.exe 1764 deblaterate.exe 1764 deblaterate.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2544 wrote to memory of 428 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 83 PID 2544 wrote to memory of 428 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 83 PID 2544 wrote to memory of 428 2544 57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe 83 PID 428 wrote to memory of 100 428 deblaterate.exe 84 PID 428 wrote to memory of 100 428 deblaterate.exe 84 PID 428 wrote to memory of 100 428 deblaterate.exe 84 PID 428 wrote to memory of 1764 428 deblaterate.exe 85 PID 428 wrote to memory of 1764 428 deblaterate.exe 85 PID 428 wrote to memory of 1764 428 deblaterate.exe 85 PID 1764 wrote to memory of 1440 1764 deblaterate.exe 86 PID 1764 wrote to memory of 1440 1764 deblaterate.exe 86 PID 1764 wrote to memory of 1440 1764 deblaterate.exe 86 PID 1764 wrote to memory of 1440 1764 deblaterate.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\57e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399.exe"3⤵PID:100
-
-
C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\murkest\deblaterate.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 6724⤵
- Program crash
PID:3204
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1764 -ip 17641⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD5d5ff273c67bf337b6c7a5fe50f3bb763
SHA1cdec165694b9173d9d23fa17eb0518f0597b6cf0
SHA25644d928169e1ba064ddf35a6b6212b6184664f008b920f0e4cdd5e941643700dd
SHA51287f923ee9be03c24aaada95934efd0ad7582947695434df9f2727549e1083de303ecc72b4bbe398fd1476a1f3a682d1bf0f21cc73693370139a1485148429fdf
-
Filesize
261KB
MD55640b94aeae5c17e2386783c6c3d4545
SHA1e4d287a77af5c0473bf0d3adadc97f0e434f7f2d
SHA2562317da619948a87bcff079bbdecb1f682bb3cecbd90a1fd08680d35cd18a4e6e
SHA512fe7851eeda03a05b5fab4de4371a7dc88abe4015a2a01de5c9587223197425e2e5132d043744ccfd5a293dec2de25ce5c28be3f8da6e35f2dd38e637de178404
-
Filesize
1.2MB
MD5472c3b7e7c7ff8660eb4a4031429c110
SHA1002706cd928985be1edb4b227f3735bf41386fbb
SHA25657e8aa6aadf86dd95bbe13eb88852bb19ee0dba4171d8a5564c0d2f884f41399
SHA51212d3c8787101ce649b868aa63a35e18acddcfc892fb4320360354686b1fb4d0b34c9cc9b41a13a318439fe9940df00c9627f7b0ef74f5d042575051be73d419b