Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2025, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe
Resource
win7-20240708-en
General
-
Target
960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe
-
Size
80KB
-
MD5
74e7fac7b65ef917ccf9a16a28e52663
-
SHA1
6b887463d02f2856fa48836e0a1f63744f77226d
-
SHA256
960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595
-
SHA512
f837e789b70e23db196951f8040431229e21a6893f770e3e77853a87c3927badf47268675989f3197fee035ea8b5b9c6913890cc3ade341a89997577e9b3f8b5
-
SSDEEP
1536:Fv5H6LNjnvIQEBJzPYTfRGyRwcVKwYNCul6hGTviJ/mH:jUz2zgTfQEYYuVv2/Y
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
162.254.34.31 - Port:
587 - Username:
[email protected] - Password:
ABwuRZS5Mjh5 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1528 created 3348 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Length.vbs 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 api.ipify.org 46 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1528 set thread context of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3284 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 4240 InstallUtil.exe 4240 InstallUtil.exe 3284 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe Token: SeDebugPrivilege 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe Token: SeDebugPrivilege 4240 InstallUtil.exe Token: 33 3284 EXCEL.EXE Token: 33 3284 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 3284 EXCEL.EXE Token: 33 3284 EXCEL.EXE Token: SeIncBasePriorityPrivilege 3284 EXCEL.EXE Token: SeDebugPrivilege 3284 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3284 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 96 PID 1528 wrote to memory of 3284 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 96 PID 1528 wrote to memory of 3284 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 96 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97 PID 1528 wrote to memory of 4240 1528 960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe"C:\Users\Admin\AppData\Local\Temp\960629415a5344e8a50051bbf2808e39c4459074eb0b37d2b8704de13143a595.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\excel_doc.xlsx"3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5f8c54480e819d1f6b150cc500447393f
SHA1d0c36af14ebd87343c147b618e4f6d8137996f96
SHA25647629dccc78e703be615ac7c67ebc4af2b19d1f63c67362eee820dc94814a268
SHA51296facbeb01a38b9085255191ae0213a6cb28d213a1a92b444732123a441a742cc6cb5dcbe08643621191c941f8c5af35daa89c135a9da870e859c689c5ea2ace
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\55CD7B264D54460785A6\DFBDBBA8B49E4AFD9EB7.0.db\Loan.0.dim\21.Loan.Principal.0.idf
Filesize256B
MD57510b601c57906c211dbf3e592f4a787
SHA1543fba4a73e18d4ee3f105584a24bfe7a16cf69d
SHA2567e2d121942af0a439a82ae3e72b1a174f958e9fda83ef24823df9818a233c844
SHA51278c6405884f362b893cf85ad1a42c3d3d4857ffd1b27ba29d08473b09241224d0272d2bd20d3b8d249f914c46f9157837cc30d7f5f9d38c4585b0c580198117d
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Loan.0.dim\0.H$Loan$Payment Date (Month).ID_TO_POS.0.idf
Filesize88B
MD5e2027d7bcd47b95a5b0a4b44af2f9abf
SHA1d4c8a76fc206fbec1dbf7211ac353f97b6c7df9b
SHA25605ae6eea68d171b03567ab66974bafe9488af7cbebc29b839ef8574d4dad72a9
SHA5129c184146766549e8c75c5948e7810629494a71cf4af1cabc80d42fc2ceabe60ea191a35fce921fffc47a23969e5dcc165995f0d63d79a3ad10c1bbb48eb4dc66
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Loan.0.dim\0.H$Loan$Payment Date (Month).POS_TO_ID.0.idf
Filesize88B
MD5aa82803a7811b574ad48bc1387804347
SHA1751612b5a90233f1abe89c76b41abab4b9db4c05
SHA256acd44f1b5168a053d77cc0f9c00847ec17ecacdfbedbed7face4578ed164b3e7
SHA512f5d823d977c43b59c1071cee8c678a39e775be9abddfb0f75a569a4c67f7380205cb2c5a494683ad795f2c82b8b6bb8a3391e2327096e33e7932d282ab41016f
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Loan.0.dim\21.Loan.Payment Date (Month).0.idf
Filesize208B
MD562baaf4b99b9cfe0e5bed08d9cec5929
SHA1ef651f7277651bdd75cf45434c027e1ed2016c4c
SHA256f2bff7550d9267b714a1a8ebdc9c375515c8c8d6f56550fe514037f8e9a06ec4
SHA512e61fbdd3d4d6800d83e15193397eb626372bafacbace2aa3816cfc1605abb24edc5357e6fd248a32838b6dff0f390e4a5863ad11d7502aa35c5bdcf78b415150
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Loan.0.dim\info.46.xml
Filesize6KB
MD57d1678433245ec05776715bad2f149a4
SHA17f843ef3d86ec6397e893e245385cf654275c9bb
SHA256c81b36e3cbe12137d9f2ef62376cd4c0849005537764e7633b0c08150c29f315
SHA5121025ee2f3d279cc4cca9d59f4b624426e1a1a9da6d99b5b82817000ca4e2555c8bbaa2a31a58484a19db95cfbbe475805d9643e1f4ecec10e91137c805b18b4c
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Model.29.cub.xml
Filesize8KB
MD5064853a3deed7a0d30cf546a66b32832
SHA1c6ac5a28f4e12b506d6237204fa0d9bb42f576bc
SHA25646c24efbc6da14bfc9e320d9f845ae2b303aca2ed484681bfbec777a99f93779
SHA5122d824e7bfcc91e1627f17fe2009c7e014f7c0e755501c85a152c38be4506e40f72f4a0d8432546f8df4f9324fc422d8c29025f88e0775b65a3a6f910f4910d52
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Model.6.cub\Loan.5.det\Loan.26.prt.xml
Filesize3KB
MD5a5edf69987a12b0333fde6617996922e
SHA14246150b4718b57e7c0cf1e2c6783711cb7b4f4c
SHA2561c3f8f69b9550d5f171686c28617284440aa17f548a52e74471b7dbb4812df1d
SHA512034b6e0bbb325370d630c60f34b3dfbb82866e6682dffc606eb8e6e2238ee32d5e759acd9f245f03c20ec05dbb376e4b5e0b2bdfd49a05e41f9cdc9a942f2bff
-
C:\Users\Admin\AppData\Local\Temp\{C5435953-3B2A-4F47-B1D8-59A698C7F3EE}\VertiPaq_64B043845B3246E3B78C\D5B46F405D134771B965.0.db\Model.6.cub\Loan.5.det\Loan.5.prt\info.26.xml
Filesize405B
MD572db76b454a91bb3d962e5a79267c8fd
SHA199a5e278fbeb416d2531a13cddf389dddae0ad25
SHA25637ff7b0f1a46aed4f653ea274f583903e9884803ad97c0566ec08b8bbce07442
SHA5129766d1ae7f50e8658520909a036a66fd7395d51f5f1f05b74358ec774527b7047be1db7d14e4dfd1ec447e0d67ad87568384442309ac0c6b9c619ef9e52a5951