Analysis
-
max time kernel
63s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 01:17
Behavioral task
behavioral1
Sample
b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe
Resource
win7-20240729-en
General
-
Target
b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe
-
Size
804KB
-
MD5
4122c9b31ec914b161c2dddcb92e06bd
-
SHA1
c973a177f213a01d5737eae7daf2f0a9598f7f92
-
SHA256
b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014
-
SHA512
74463d55e678707566112ff1598cd70da2bedb83dcc6945e8cce60c96157261f79c5bd0b9c3e711d7bd4cb14b64dcecb2655d93b27148a324ed7e0b69ec2549c
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLqSwRGC3J5EBmptg39L2JGLa+RLlp7ApH3kRyMySj3:tthEVaPqLqlrjlg3p2JGLNx7qqN2O88
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unrosed.vbs unrosed.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 unrosed.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1672-12-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2368-11-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1672-25-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 2956 1672 unrosed.exe 31 -
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x000700000001960a-5.dat upx behavioral1/memory/2368-7-0x00000000025F0000-0x00000000026B2000-memory.dmp upx behavioral1/memory/1672-12-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2368-11-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1672-25-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unrosed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2956 RegSvcs.exe 2956 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1672 unrosed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 1672 unrosed.exe 1672 unrosed.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 1672 unrosed.exe 1672 unrosed.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1672 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 30 PID 2368 wrote to memory of 1672 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 30 PID 2368 wrote to memory of 1672 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 30 PID 2368 wrote to memory of 1672 2368 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 30 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31 PID 1672 wrote to memory of 2956 1672 unrosed.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\chordates\unrosed.exe"C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5118e3a1a5f3a3549d390f3e2609408ea
SHA13ff93e439b8356eed8bd504f0b2d0a6bfedd5357
SHA256768410a7487908dfbed1eac5a3faadafb8b2302baaf77153e6d0675f2e9a6749
SHA512cd71fe266b43b9febd1036330ae1542db974a9a14ee35364cba1e356f1a7a35412f09f3ab438f8cc2230bf3e7c30e01a7017c17d85e5a5c65d33154900621deb
-
Filesize
804KB
MD54122c9b31ec914b161c2dddcb92e06bd
SHA1c973a177f213a01d5737eae7daf2f0a9598f7f92
SHA256b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014
SHA51274463d55e678707566112ff1598cd70da2bedb83dcc6945e8cce60c96157261f79c5bd0b9c3e711d7bd4cb14b64dcecb2655d93b27148a324ed7e0b69ec2549c