Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe
Resource
win7-20240903-en
General
-
Target
e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe
-
Size
1.0MB
-
MD5
9b9757a5fbdba08d72cdbf792719ce05
-
SHA1
7c078ef89b481f54cd7662feee5667a05f1cf976
-
SHA256
e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470
-
SHA512
1c55ef18a10b757cf68662dceeb766891a260ba2d7befdce9bc243fe88f5367741773a34c940f623c8d0595237e7875e79a72df016767f058cc52a747dc021fb
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iapbS9lys5p3evn:mJZoQrbTFZY1iapopp32n
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4184 set thread context of 2876 4184 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 RegSvcs.exe 2876 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 4184 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 RegSvcs.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1984 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 84 PID 2604 wrote to memory of 1984 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 84 PID 2604 wrote to memory of 1984 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 84 PID 2604 wrote to memory of 3640 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 85 PID 2604 wrote to memory of 3640 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 85 PID 2604 wrote to memory of 3640 2604 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 85 PID 3640 wrote to memory of 4148 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 86 PID 3640 wrote to memory of 4148 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 86 PID 3640 wrote to memory of 4148 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 86 PID 3640 wrote to memory of 1716 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 87 PID 3640 wrote to memory of 1716 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 87 PID 3640 wrote to memory of 1716 3640 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 87 PID 1716 wrote to memory of 2368 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 94 PID 1716 wrote to memory of 2368 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 94 PID 1716 wrote to memory of 2368 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 94 PID 1716 wrote to memory of 4184 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 95 PID 1716 wrote to memory of 4184 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 95 PID 1716 wrote to memory of 4184 1716 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 95 PID 4184 wrote to memory of 2876 4184 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 98 PID 4184 wrote to memory of 2876 4184 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 98 PID 4184 wrote to memory of 2876 4184 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 98 PID 4184 wrote to memory of 2876 4184 e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"2⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"3⤵PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"4⤵PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\e3a98692873ba0cf199f4e0b22e80e3e648da2494824ac0094e64a806e5fe470.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD597922ad76124355bf4a541fa9b7454d5
SHA1c8c75993ca09c7a7f3123a4086a43d99bb8fb6a5
SHA2567107f950f3851fb1baaac18abbe28ce1c794a504206d4cedd1c9964104d7bd98
SHA512c37c410fcd61f1400e9d6e77812a780b4d2cc1bf025a68b922d87b9461f120b4cec9e1d1c4f523e05b6048f0c683fa17d50192f13e30a122aec8abced2da4fec
-
Filesize
9KB
MD541ef59538ee4ea64e4d25bbc56c68a3f
SHA190770d09fa37f8395c6643aff29cbd9e9e609598
SHA2569416ff5fe819bc36681d143040836925f3e0f5fcfca18e920fb376f6ca371f42
SHA5120f4fb93bc1d2d040502153059ec9cb5aa072b3cb8359b98427a9b6124c491483c3baafa1bf9bbd88ecfeae4d473d155bfa8b98fc5ea73e5ef032c8ecaa1ac286
-
Filesize
29KB
MD5cbc82a165f3fc70af6a715f89d5a2e98
SHA119925647a458aeb42321f031cccfcaaca7b0f710
SHA25651ec1a307d2681809c872ca831547a4c7279d654d37ec43b00c6eb0f493a3f9a
SHA512232956a7454428689ddb17150ddea99ca0c435c1d9a7e55809e816323b170df3e80ab941708ec411e3e3513f021f530c26e07629931ee1b0b790d761b0cd789d