Analysis
-
max time kernel
140s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 01:44
Static task
static1
Behavioral task
behavioral1
Sample
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe
Resource
win10v2004-20241007-en
General
-
Target
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe
-
Size
3.4MB
-
MD5
f5f811e6fb7870b544f73b1c7e1592d1
-
SHA1
d0191c810c6fe865a303cfa5dcc91ce7b29008f5
-
SHA256
bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29
-
SHA512
ed36a5220140f7eea7429bdc40a4ca3d68032016783fcc468eb486b55f4d9fb49fb9d3b6b9cc91dae17cd2b8bfda818fd3381b73e87df99cc255c7e412df7fc2
-
SSDEEP
49152:h/y6lbG5Ak3fVEdBr1OEFGwtnym/ifzKzCjLoyEkmZ9Y14X:h05Aq9ir1OEFGwtnymKLKzJAu
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
myhp6000
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
myhp6000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023b3e-2.dat family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 3120 test.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 test.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 test.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 test.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3120 test.exe 3120 test.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3120 test.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4568 wrote to memory of 856 4568 bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe 84 PID 4568 wrote to memory of 856 4568 bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe 84 PID 4568 wrote to memory of 856 4568 bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe 84 PID 856 wrote to memory of 3120 856 cmd.exe 85 PID 856 wrote to memory of 3120 856 cmd.exe 85 PID 856 wrote to memory of 3120 856 cmd.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 test.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe"C:\Users\Admin\AppData\Local\Temp\bedbc10299e32fd674c79bc190b7512bec1b5c94c5b4665f00aa65e0876a5c29.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD58ec79ad9d56c8d458febd1c69b9069d8
SHA1cb048e8b78dbbcda6ab0fb7dca555d141afbd1b3
SHA2563d188a0945681b28e2c289de2c82ab3a5fd7f15a94b9354b62f0808406d51b56
SHA51251920be83719844f69ef2413f187c8d97b3a97713a27c1946555bf7b6f614bc13b0ee85f361631165c05f7cb4ae2abaaac3b1de65150d746aafe760ed074c4e1