Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 01:17
Static task
static1
Behavioral task
behavioral1
Sample
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe
Resource
win7-20240903-en
General
-
Target
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe
-
Size
1012KB
-
MD5
bc7fee37d8d779b635750bce96b9ecd9
-
SHA1
7ea7eb2001c6a29d93f2d780dbf2ef37070689be
-
SHA256
382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d
-
SHA512
1fcafcd2fc26508f1c18d5261cfad45a43b98dc6bb67665c8c3d89af120cb1eaad7204b46901424927f034ff3f9e8f72724bd3a5250e79c7ec5457ecfd6eb70e
-
SSDEEP
12288:Jtb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNDPPpHrYPTYC2ajbP50s3o32VV6:Jtb20pkaCqT5TBWgNjVYrpv13G+V6A
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unjuridically.vbs unjuridically.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 unjuridically.exe -
Loads dropped DLL 6 IoCs
pid Process 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe 2700 WerFault.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2364-0-0x0000000000F50000-0x0000000001054000-memory.dmp autoit_exe behavioral1/memory/2364-12-0x00000000006E0000-0x0000000000AE0000-memory.dmp autoit_exe behavioral1/files/0x0007000000018728-14.dat autoit_exe behavioral1/memory/2304-18-0x0000000000160000-0x0000000000264000-memory.dmp autoit_exe behavioral1/memory/2304-33-0x0000000000930000-0x0000000000D30000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2300 2304 unjuridically.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2304 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unjuridically.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2300 RegSvcs.exe 2300 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2304 unjuridically.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2300 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 2304 unjuridically.exe 2304 unjuridically.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 2304 unjuridically.exe 2304 unjuridically.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2304 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 30 PID 2364 wrote to memory of 2304 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 30 PID 2364 wrote to memory of 2304 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 30 PID 2364 wrote to memory of 2304 2364 382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe 30 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2300 2304 unjuridically.exe 31 PID 2304 wrote to memory of 2700 2304 unjuridically.exe 32 PID 2304 wrote to memory of 2700 2304 unjuridically.exe 32 PID 2304 wrote to memory of 2700 2304 unjuridically.exe 32 PID 2304 wrote to memory of 2700 2304 unjuridically.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe"C:\Users\Admin\AppData\Local\Temp\382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Lityerses\unjuridically.exe"C:\Users\Admin\AppData\Local\Temp\382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 3203⤵
- Loads dropped DLL
- Program crash
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1012KB
MD5bc7fee37d8d779b635750bce96b9ecd9
SHA17ea7eb2001c6a29d93f2d780dbf2ef37070689be
SHA256382b40ce3e7d7fc44a80d1b9190914a401c968be78c7115a8e4e3ccd40b8888d
SHA5121fcafcd2fc26508f1c18d5261cfad45a43b98dc6bb67665c8c3d89af120cb1eaad7204b46901424927f034ff3f9e8f72724bd3a5250e79c7ec5457ecfd6eb70e