Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 01:32
Behavioral task
behavioral1
Sample
eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe
Resource
win7-20241010-en
General
-
Target
eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe
-
Size
771KB
-
MD5
6de815a10400800fc5cab138318fe07a
-
SHA1
c14b5f38c05397d9171033fe40db5e71ab5825ac
-
SHA256
eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f
-
SHA512
b2dc2321b18c4b639824f9d43a9e74adf8dfceba101d1554fb87b200748deb5a1c8934477e75ad70cf4018dd31af779033fdb8a15ce934bb57aa4b2030b0ede6
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLERO6KZRF6zWgdsWfw3YG4tsasr9MEgXlkQhjlXNyV:tthEVaPqLthMwDcf5VkQdlXNfO
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\avenses.vbs avenses.exe -
Executes dropped EXE 1 IoCs
pid Process 1136 avenses.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/800-9-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/1136-16-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1136 set thread context of 4068 1136 avenses.exe 84 -
resource yara_rule behavioral2/memory/800-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x0007000000023c67-6.dat upx behavioral2/memory/800-9-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1136-16-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avenses.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4068 RegSvcs.exe 4068 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1136 avenses.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4068 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 1136 avenses.exe 1136 avenses.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 1136 avenses.exe 1136 avenses.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 800 wrote to memory of 1136 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 83 PID 800 wrote to memory of 1136 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 83 PID 800 wrote to memory of 1136 800 eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe 83 PID 1136 wrote to memory of 4068 1136 avenses.exe 84 PID 1136 wrote to memory of 4068 1136 avenses.exe 84 PID 1136 wrote to memory of 4068 1136 avenses.exe 84 PID 1136 wrote to memory of 4068 1136 avenses.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe"C:\Users\Admin\AppData\Local\Temp\eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Cocles\avenses.exe"C:\Users\Admin\AppData\Local\Temp\eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD56de815a10400800fc5cab138318fe07a
SHA1c14b5f38c05397d9171033fe40db5e71ab5825ac
SHA256eac7ca59f3b380ab48d1c46400c910b783d98aa99e536f7dcf8115a7d240807f
SHA512b2dc2321b18c4b639824f9d43a9e74adf8dfceba101d1554fb87b200748deb5a1c8934477e75ad70cf4018dd31af779033fdb8a15ce934bb57aa4b2030b0ede6
-
Filesize
239KB
MD579e23bd397207bfbbe16162e03322b51
SHA16470fdd21f205155dea76d7a72f3fedbd3f1321c
SHA2569d7ed8fb30e41c4d4512f0b96083e4f6cdbafb47d3e4f780f680e32423c89dec
SHA5127ce024e815231056434d1687b2ffd964021c60e8c43a3eef4dfa20accf3d2e87af8a2346119ab0a92e54fe6574b86e0ed7fb7192b5f755868f32956cbf97138b