Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 11:29

General

  • Target

    TR98760H.exe

  • Size

    1.4MB

  • MD5

    6a52dd7596c5dad865e414e58d84eb9d

  • SHA1

    62437efb5194184f5db6647a81c7a14bcbb498e9

  • SHA256

    dea077180d1a981a1a9bd8f901bc177236825f173e5e2394161811797933fdc2

  • SHA512

    4ac03b5e7ed70150154b0b632549434952e71150aa14019ae3db8da027db7ab7985fad2435b504abc9a896385dc3942db15f46cbe87b73913862b3af4a6c640f

  • SSDEEP

    24576:bqDEvCTbMWu7rQYlBQcBiT6rprG8alxXVnSRkCs8AUnknYJepRo25Hp:bTvC/MTQYxsWR7al/nrFGfeU2

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.antoniomayol.com:21
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    cMhKDQUk1{;%

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TR98760H.exe
    "C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Hymenophyllaceae\Tererro.exe
      "C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\TR98760H.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\antiprimer

    Filesize

    239KB

    MD5

    4bb8a70bffab9de2359dd87d859450df

    SHA1

    45cf687f0472ae66144fd7093ab71058bb0a6704

    SHA256

    42eb9689feb5408b38c2395eb2b41fe2edb5964745ce70930084fabc35747ad3

    SHA512

    b095a5adb51bae830ff7a2edf8eaf554f8ddad8b5900c0601d491bf278b8d838e8e31c6af9db6b6d12814ca7fe9b381d0735ab0787b94958a696c47e898221a9

  • \Users\Admin\AppData\Local\Hymenophyllaceae\Tererro.exe

    Filesize

    1.4MB

    MD5

    6a52dd7596c5dad865e414e58d84eb9d

    SHA1

    62437efb5194184f5db6647a81c7a14bcbb498e9

    SHA256

    dea077180d1a981a1a9bd8f901bc177236825f173e5e2394161811797933fdc2

    SHA512

    4ac03b5e7ed70150154b0b632549434952e71150aa14019ae3db8da027db7ab7985fad2435b504abc9a896385dc3942db15f46cbe87b73913862b3af4a6c640f

  • memory/1904-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1904-18-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1904-17-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1904-19-0x000000007414E000-0x000000007414F000-memory.dmp

    Filesize

    4KB

  • memory/1904-20-0x0000000074140000-0x000000007482E000-memory.dmp

    Filesize

    6.9MB

  • memory/1904-21-0x000000007414E000-0x000000007414F000-memory.dmp

    Filesize

    4KB

  • memory/1904-22-0x0000000074140000-0x000000007482E000-memory.dmp

    Filesize

    6.9MB

  • memory/2336-2-0x0000000000750000-0x0000000000B50000-memory.dmp

    Filesize

    4.0MB

  • memory/2496-12-0x0000000000A10000-0x0000000000E10000-memory.dmp

    Filesize

    4.0MB