Analysis
-
max time kernel
57s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 22:32
Static task
static1
Behavioral task
behavioral1
Sample
Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.7z
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.7z
Resource
win10v2004-20241007-en
General
-
Target
Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.7z
-
Size
791KB
-
MD5
eefe9cb1da2c5dc85184e4f47e5550bb
-
SHA1
062563762fa1051449405812ae257dddb4c6694c
-
SHA256
e446ae2fc3adac5f36700dc6c69efb421a569266cae84742e7027d6c980a0f6e
-
SHA512
f085850f6402b957a7f048284131d7e4f3e696d5b6b4b4609bea1d93f61805af0451dc942fb24ee585b3e892c906284e13d5a95fc6097cb4253c2669f9bc3a44
-
SSDEEP
12288:XpUqUQJx5t42kZqfYt6J5EquI6jDsjPeJA7hJDwN0Brp/Uga6ZRxzZ6ls6Gbpj:ZpUe5ePqfBjJj/hXZ9Uga6RxsGbpj
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.controlfire.com.mx - Port:
21 - Username:
[email protected] - Password:
0a4XlE=4t8mz
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE 5 IoCs
pid Process 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3048 set thread context of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 584 set thread context of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 840 set thread context of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 2860 set thread context of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2544 set thread context of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1628 7zFM.exe 2248 regasm.exe 2524 regasm.exe 2248 regasm.exe 2524 regasm.exe 1628 7zFM.exe 1628 7zFM.exe 2384 regasm.exe 2384 regasm.exe 1628 7zFM.exe 1628 7zFM.exe 2408 regasm.exe 2408 regasm.exe 1628 7zFM.exe 1628 7zFM.exe 2056 regasm.exe 2056 regasm.exe 1628 7zFM.exe 1628 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1628 7zFM.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 1628 7zFM.exe Token: 35 1628 7zFM.exe Token: SeSecurityPrivilege 1628 7zFM.exe Token: SeSecurityPrivilege 1628 7zFM.exe Token: SeDebugPrivilege 2248 regasm.exe Token: SeDebugPrivilege 2524 regasm.exe Token: SeSecurityPrivilege 1628 7zFM.exe Token: SeSecurityPrivilege 1628 7zFM.exe Token: SeDebugPrivilege 2384 regasm.exe Token: SeDebugPrivilege 2408 regasm.exe Token: SeSecurityPrivilege 1628 7zFM.exe Token: SeDebugPrivilege 2056 regasm.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1628 7zFM.exe 1628 7zFM.exe 1628 7zFM.exe 1628 7zFM.exe 1628 7zFM.exe 1628 7zFM.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1628 wrote to memory of 584 1628 7zFM.exe 30 PID 1628 wrote to memory of 584 1628 7zFM.exe 30 PID 1628 wrote to memory of 584 1628 7zFM.exe 30 PID 1628 wrote to memory of 584 1628 7zFM.exe 30 PID 1628 wrote to memory of 3048 1628 7zFM.exe 31 PID 1628 wrote to memory of 3048 1628 7zFM.exe 31 PID 1628 wrote to memory of 3048 1628 7zFM.exe 31 PID 1628 wrote to memory of 3048 1628 7zFM.exe 31 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 3048 wrote to memory of 2248 3048 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 33 PID 584 wrote to memory of 2524 584 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 32 PID 1628 wrote to memory of 2860 1628 7zFM.exe 35 PID 1628 wrote to memory of 2860 1628 7zFM.exe 35 PID 1628 wrote to memory of 2860 1628 7zFM.exe 35 PID 1628 wrote to memory of 2860 1628 7zFM.exe 35 PID 1628 wrote to memory of 840 1628 7zFM.exe 36 PID 1628 wrote to memory of 840 1628 7zFM.exe 36 PID 1628 wrote to memory of 840 1628 7zFM.exe 36 PID 1628 wrote to memory of 840 1628 7zFM.exe 36 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 840 wrote to memory of 2384 840 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 37 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 2860 wrote to memory of 2408 2860 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 38 PID 1628 wrote to memory of 2544 1628 7zFM.exe 39 PID 1628 wrote to memory of 2544 1628 7zFM.exe 39 PID 1628 wrote to memory of 2544 1628 7zFM.exe 39 PID 1628 wrote to memory of 2544 1628 7zFM.exe 39 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40 PID 2544 wrote to memory of 2056 2544 Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe 40
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.7z"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\7zOC56ABEF7\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"C:\Users\Admin\AppData\Local\Temp\7zOC56ABEF7\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC5625DF7\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"C:\Users\Admin\AppData\Local\Temp\7zOC5625DF7\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC5644308\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"C:\Users\Admin\AppData\Local\Temp\7zOC5644308\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC564C008\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"C:\Users\Admin\AppData\Local\Temp\7zOC564C008\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC5698448\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"C:\Users\Admin\AppData\Local\Temp\7zOC5698448\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zOC56ABEF7\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe
Filesize2.5MB
MD570de418c59709a8703cb46deee36bde6
SHA169ca92a03fc7d986f686c0acafc51dcf515c2f7c
SHA2569da74e41306059077f155debea5f44a5969e79297c9de44a4e355e4bb68b0536
SHA512cbeedd7aa302b1db4de7608f8f0c35aec37c38421979b6ae43eb759e13129b1e5343e343ebe0910cb8290fb91200a91fd7796a61aaac9e09c271dbdc352ca315