Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 14:56
Behavioral task
behavioral1
Sample
811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe
Resource
win7-20240903-en
General
-
Target
811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe
-
Size
538KB
-
MD5
fc76d8b178c0aa094eba5fea74e82614
-
SHA1
f2f88413e1e3aed4fd731769037c3d2391d29c94
-
SHA256
811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b
-
SHA512
72f5ca123610cbc3ccee6630148c61e99f8ddbffbbe835eb2bf323a0a6d5f2fdd57bafa139595e62ea485f2086b1dd46f994281070639cd5e7ff89eb3422fd2b
-
SSDEEP
12288:ZOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiGDtC2ajbP50s3o32+:Zq5TfcdHj4fmbcv13GV
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unjuridically.vbs unjuridically.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 unjuridically.exe -
Loads dropped DLL 1 IoCs
pid Process 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/768-20-0x0000000000F40000-0x000000000107F000-memory.dmp autoit_exe behavioral1/memory/1412-43-0x0000000000A50000-0x0000000000B8F000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1412 set thread context of 2912 1412 unjuridically.exe 31 -
resource yara_rule behavioral1/memory/768-0-0x0000000000F40000-0x000000000107F000-memory.dmp upx behavioral1/files/0x00080000000173a9-14.dat upx behavioral1/memory/1412-21-0x0000000000A50000-0x0000000000B8F000-memory.dmp upx behavioral1/memory/768-20-0x0000000000F40000-0x000000000107F000-memory.dmp upx behavioral1/memory/1412-43-0x0000000000A50000-0x0000000000B8F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unjuridically.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2912 RegSvcs.exe 2912 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1412 unjuridically.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2912 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 1412 unjuridically.exe 1412 unjuridically.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 1412 unjuridically.exe 1412 unjuridically.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 768 wrote to memory of 1412 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 30 PID 768 wrote to memory of 1412 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 30 PID 768 wrote to memory of 1412 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 30 PID 768 wrote to memory of 1412 768 811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe 30 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31 PID 1412 wrote to memory of 2912 1412 unjuridically.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe"C:\Users\Admin\AppData\Local\Temp\811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Lityerses\unjuridically.exe"C:\Users\Admin\AppData\Local\Temp\811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5fd16ac67e115a223cc50f5019a3f052b
SHA11d703ac8ff6eb9450697cd1876405ae608e9cf37
SHA25611374f7b169a7dd18927070d7961f1050fc8b6a98b9803eb15a2687f4a62d89d
SHA512593582a3d9eb4d2a9e0a35099819a14fd3b6633456a2f33c48652bf97f615e34abc435bdf7c9144e54f9e7d6b88480110892b51e9d5d29e73698b80d493ef2fd
-
Filesize
538KB
MD5fc76d8b178c0aa094eba5fea74e82614
SHA1f2f88413e1e3aed4fd731769037c3d2391d29c94
SHA256811c8854ea3adcd1259c28cf1dc60e0a0a2f7a44f463e98f77c277a2a2f6394b
SHA51272f5ca123610cbc3ccee6630148c61e99f8ddbffbbe835eb2bf323a0a6d5f2fdd57bafa139595e62ea485f2086b1dd46f994281070639cd5e7ff89eb3422fd2b