Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 07:52
Static task
static1
Behavioral task
behavioral1
Sample
C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe
Resource
win7-20241010-en
General
-
Target
C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe
-
Size
1.2MB
-
MD5
5f23c17f4b0f1a42bfe463ee74a92ec9
-
SHA1
439fa7be32d52c871c737e4b2b97ad93305319e9
-
SHA256
c05a2d99f15bfc8dc10c8cceb84db95faece377ba0ad38ed882ecba59e1bdcae
-
SHA512
bc8f5e2c1a53afd026f3105811e3d4c0404dc466bfe2708e64e22ed14fb244475a269d292069808c02e00fab9a9eaffd03d86dbefcd35c5ea73e84739768cce3
-
SSDEEP
24576:vqDEvCTbMWu7rQYlBQcBiT6rprG8abNJLqSNwa1kCP8NUWg:vTvC/MTQYxsWR7abvl66m
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2904 set thread context of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 RegSvcs.exe 2348 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2828 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 30 PID 2700 wrote to memory of 2784 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 31 PID 2700 wrote to memory of 2784 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 31 PID 2700 wrote to memory of 2784 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 31 PID 2700 wrote to memory of 2784 2700 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 31 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 468 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 32 PID 2784 wrote to memory of 2904 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 33 PID 2784 wrote to memory of 2904 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 33 PID 2784 wrote to memory of 2904 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 33 PID 2784 wrote to memory of 2904 2784 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 33 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34 PID 2904 wrote to memory of 2348 2904 C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"2⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"3⤵PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\C05A2D99F15BFC8DC10C8CCEB84DB95FAECE377BA0AD38ED882ECBA59E1BDCAE.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD580c7fccddd137a0e3185eda73957e4f8
SHA1660b4b634a9a20dcb43b209bf724c9a0a3a926e7
SHA2565d5278ef82936cdae37be1a02fe7af8ef2fadee7a8e212202aee0744f4e98c86
SHA512705759cdca2ce95505bd2516c35252fb779d28005facd36a11518054572cf187d5faf102aa200834acf60147e9d8db8429dcb62e3b478cdb55cab932a892d161
-
Filesize
42KB
MD52f297e11197ead6d873c29590e34d148
SHA1d594085b53315830e86ee240bad3cd818d4d6032
SHA256404607bb87788722a9d3d9e3707409ea865b08d35fb89587f59f752ad69dcbf8
SHA5123905df92c2c217d4a426d9f4f0a8f73c53b70f010c179e2e8bd8e29280737cede1830430c667068dd9125207183321808d8eb8427d50e32eadcf5b0f899cec4a
-
Filesize
262KB
MD56cec6a9368f0d08f5f4861e1595508b3
SHA11883f949575a7387e101d372e00cefbf8b1bb302
SHA256f71c6cded9397fbb6455fab8b94962cf2c1af1e59036827eecbb7618fe6b250a
SHA512f32da71ea8d693b84be6d9d6a1f6bba87dca0721e36f7c4d1902f1c98dd60fd58379219e984817e2d109b116f746aa2ea1c312125da909d8f86d9d62e4f19c81
-
Filesize
84KB
MD5ce40d3e9f4a1898078ecac29995f5292
SHA1babd5f5caa8bee7472d926c64c1283e9ffab857f
SHA256afbb4cf115ccfdc367cb68208f5c7ba5d1566b8004749dfc228e67071f342ed4
SHA51279ffd89ade909d931b4e9168858ebcff871eaa478fa96d461b7e48ae57f222266ae1bf78c624adad5aae59db973a1d74ae9a47f0a50cf38cbd821127998a131c