Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 11:29
Static task
static1
Behavioral task
behavioral1
Sample
TR98760H.exe
Resource
win7-20240903-en
General
-
Target
TR98760H.exe
-
Size
1.4MB
-
MD5
6a52dd7596c5dad865e414e58d84eb9d
-
SHA1
62437efb5194184f5db6647a81c7a14bcbb498e9
-
SHA256
dea077180d1a981a1a9bd8f901bc177236825f173e5e2394161811797933fdc2
-
SHA512
4ac03b5e7ed70150154b0b632549434952e71150aa14019ae3db8da027db7ab7985fad2435b504abc9a896385dc3942db15f46cbe87b73913862b3af4a6c640f
-
SSDEEP
24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8alxXVnSRkCs8AUnknYJepRo25Hp:bTvC/MTQYxsWR7al/nrFGfeU2
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Tererro.vbs Tererro.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 Tererro.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 TR98760H.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000800000001650a-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 1904 2496 Tererro.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TR98760H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tererro.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 RegSvcs.exe 1904 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2496 Tererro.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1904 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2336 TR98760H.exe 2336 TR98760H.exe 2496 Tererro.exe 2496 Tererro.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2336 TR98760H.exe 2336 TR98760H.exe 2496 Tererro.exe 2496 Tererro.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2496 2336 TR98760H.exe 31 PID 2336 wrote to memory of 2496 2336 TR98760H.exe 31 PID 2336 wrote to memory of 2496 2336 TR98760H.exe 31 PID 2336 wrote to memory of 2496 2336 TR98760H.exe 31 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32 PID 2496 wrote to memory of 1904 2496 Tererro.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Hymenophyllaceae\Tererro.exe"C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD54bb8a70bffab9de2359dd87d859450df
SHA145cf687f0472ae66144fd7093ab71058bb0a6704
SHA25642eb9689feb5408b38c2395eb2b41fe2edb5964745ce70930084fabc35747ad3
SHA512b095a5adb51bae830ff7a2edf8eaf554f8ddad8b5900c0601d491bf278b8d838e8e31c6af9db6b6d12814ca7fe9b381d0735ab0787b94958a696c47e898221a9
-
Filesize
1.4MB
MD56a52dd7596c5dad865e414e58d84eb9d
SHA162437efb5194184f5db6647a81c7a14bcbb498e9
SHA256dea077180d1a981a1a9bd8f901bc177236825f173e5e2394161811797933fdc2
SHA5124ac03b5e7ed70150154b0b632549434952e71150aa14019ae3db8da027db7ab7985fad2435b504abc9a896385dc3942db15f46cbe87b73913862b3af4a6c640f