Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 01:21
Static task
static1
Behavioral task
behavioral1
Sample
Ref#66001032.exe
Resource
win7-20240903-en
General
-
Target
Ref#66001032.exe
-
Size
80KB
-
MD5
74e7fac7b65ef917ccf9a16a28e52663
-
SHA1
6b887463d02f2856fa48836e0a1f63744f77226d
-
SHA256
960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595
-
SHA512
f837e789b70e23db196951f8040431229e21a6893f770e3e77853a87c3927badf47268675989f3197fee035ea8b5b9c6913890cc3ade341a89997577e9b3f8b5
-
SSDEEP
1536:Fv5H6LNjnvIQEBJzPYTfRGyRwcVKwYNCul6hGTviJ/mH:jUz2zgTfQEYYuVv2/Y
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5068 created 3368 5068 Ref#66001032.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Ref#66001032.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Length.vbs Ref#66001032.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 api.ipify.org 50 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 3800 5068 Ref#66001032.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ref#66001032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings Ref#66001032.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4752 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5068 Ref#66001032.exe 5068 Ref#66001032.exe 5068 Ref#66001032.exe 3800 InstallUtil.exe 3800 InstallUtil.exe 4752 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 5068 Ref#66001032.exe Token: SeDebugPrivilege 5068 Ref#66001032.exe Token: SeDebugPrivilege 3800 InstallUtil.exe Token: 33 4752 EXCEL.EXE Token: 33 4752 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 4752 EXCEL.EXE Token: 33 4752 EXCEL.EXE Token: SeIncBasePriorityPrivilege 4752 EXCEL.EXE Token: SeDebugPrivilege 4752 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE 4752 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4752 5068 Ref#66001032.exe 91 PID 5068 wrote to memory of 4752 5068 Ref#66001032.exe 91 PID 5068 wrote to memory of 4752 5068 Ref#66001032.exe 91 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92 PID 5068 wrote to memory of 3800 5068 Ref#66001032.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\Ref#66001032.exe"C:\Users\Admin\AppData\Local\Temp\Ref#66001032.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\excel_doc.xlsx"3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4752
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5f8c54480e819d1f6b150cc500447393f
SHA1d0c36af14ebd87343c147b618e4f6d8137996f96
SHA25647629dccc78e703be615ac7c67ebc4af2b19d1f63c67362eee820dc94814a268
SHA51296facbeb01a38b9085255191ae0213a6cb28d213a1a92b444732123a441a742cc6cb5dcbe08643621191c941f8c5af35daa89c135a9da870e859c689c5ea2ace
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\999527A8117B40328A87\DFBDBBA8B49E4AFD9EB7.0.db\Loan.0.dim\21.Loan.Principal.0.idf
Filesize256B
MD57510b601c57906c211dbf3e592f4a787
SHA1543fba4a73e18d4ee3f105584a24bfe7a16cf69d
SHA2567e2d121942af0a439a82ae3e72b1a174f958e9fda83ef24823df9818a233c844
SHA51278c6405884f362b893cf85ad1a42c3d3d4857ffd1b27ba29d08473b09241224d0272d2bd20d3b8d249f914c46f9157837cc30d7f5f9d38c4585b0c580198117d
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Loan.0.dim\0.H$Loan$Payment Date (Month).ID_TO_POS.0.idf
Filesize88B
MD5e2027d7bcd47b95a5b0a4b44af2f9abf
SHA1d4c8a76fc206fbec1dbf7211ac353f97b6c7df9b
SHA25605ae6eea68d171b03567ab66974bafe9488af7cbebc29b839ef8574d4dad72a9
SHA5129c184146766549e8c75c5948e7810629494a71cf4af1cabc80d42fc2ceabe60ea191a35fce921fffc47a23969e5dcc165995f0d63d79a3ad10c1bbb48eb4dc66
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Loan.0.dim\0.H$Loan$Payment Date (Month).POS_TO_ID.0.idf
Filesize88B
MD5aa82803a7811b574ad48bc1387804347
SHA1751612b5a90233f1abe89c76b41abab4b9db4c05
SHA256acd44f1b5168a053d77cc0f9c00847ec17ecacdfbedbed7face4578ed164b3e7
SHA512f5d823d977c43b59c1071cee8c678a39e775be9abddfb0f75a569a4c67f7380205cb2c5a494683ad795f2c82b8b6bb8a3391e2327096e33e7932d282ab41016f
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Loan.0.dim\21.Loan.Payment Date (Month Index).0.idf
Filesize208B
MD562baaf4b99b9cfe0e5bed08d9cec5929
SHA1ef651f7277651bdd75cf45434c027e1ed2016c4c
SHA256f2bff7550d9267b714a1a8ebdc9c375515c8c8d6f56550fe514037f8e9a06ec4
SHA512e61fbdd3d4d6800d83e15193397eb626372bafacbace2aa3816cfc1605abb24edc5357e6fd248a32838b6dff0f390e4a5863ad11d7502aa35c5bdcf78b415150
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Loan.0.dim\info.46.xml
Filesize6KB
MD57d1678433245ec05776715bad2f149a4
SHA17f843ef3d86ec6397e893e245385cf654275c9bb
SHA256c81b36e3cbe12137d9f2ef62376cd4c0849005537764e7633b0c08150c29f315
SHA5121025ee2f3d279cc4cca9d59f4b624426e1a1a9da6d99b5b82817000ca4e2555c8bbaa2a31a58484a19db95cfbbe475805d9643e1f4ecec10e91137c805b18b4c
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Model.29.cub.xml
Filesize8KB
MD5d7d8414b14b5da37fe0489124ee52930
SHA1bc6ca3c1246cb5c805d31a271d21626d1e06447b
SHA2562596b45e3f06b0bd1e41e042804939188e4c47bb969b8a348e1db713312ddc70
SHA512bf41ce634a199ab4ca4f78fed983559fc586a2675c767cec077b4b84a6a81ef6ec6405f089a6e720492ad2e57e10a0de98f32db457d6fd6aff47a2d2ff26dca7
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Model.6.cub\Loan.5.det\Loan.26.prt.xml
Filesize3KB
MD5a9f70bd5f5f6eac03672ed41f52f0809
SHA1b036a4dcfbbdba9a188e431085a6ee69e32fb7e7
SHA256ac1ded1b74150e7296d404d0c042572fec0450cb8cf94366c34e2bb6253b1eca
SHA5126bfffcc13804f4745ec9e7a01a4b7f77eb547b76466ab3614b8e283f58615a7802cb8bc2775dae0348a74fa40482c8bea3c2ed3960c0f6740213664d97d2ce15
-
C:\Users\Admin\AppData\Local\Temp\{E6F8C7F1-9E36-4306-9C28-8A0639246755}\VertiPaq_24FDE8A4AD0E4336AEC8\A63F7C354B04729A627.0.db\Model.6.cub\Loan.5.det\Loan.5.prt\info.26.xml
Filesize405B
MD572db76b454a91bb3d962e5a79267c8fd
SHA199a5e278fbeb416d2531a13cddf389dddae0ad25
SHA25637ff7b0f1a46aed4f653ea274f583903e9884803ad97c0566ec08b8bbce07442
SHA5129766d1ae7f50e8658520909a036a66fd7395d51f5f1f05b74358ec774527b7047be1db7d14e4dfd1ec447e0d67ad87568384442309ac0c6b9c619ef9e52a5951