Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 01:17
Behavioral task
behavioral1
Sample
b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe
Resource
win7-20240729-en
General
-
Target
b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe
-
Size
804KB
-
MD5
4122c9b31ec914b161c2dddcb92e06bd
-
SHA1
c973a177f213a01d5737eae7daf2f0a9598f7f92
-
SHA256
b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014
-
SHA512
74463d55e678707566112ff1598cd70da2bedb83dcc6945e8cce60c96157261f79c5bd0b9c3e711d7bd4cb14b64dcecb2655d93b27148a324ed7e0b69ec2549c
-
SSDEEP
12288:v6Wq4aaE6KwyF5L0Y2D1PqLqSwRGC3J5EBmptg39L2JGLa+RLlp7ApH3kRyMySj3:tthEVaPqLqlrjlg3p2JGLNx7qqN2O88
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unrosed.vbs unrosed.exe -
Executes dropped EXE 1 IoCs
pid Process 5060 unrosed.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/532-9-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/5060-21-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5060 set thread context of 3116 5060 unrosed.exe 84 -
resource yara_rule behavioral2/memory/532-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x0008000000023c9f-6.dat upx behavioral2/memory/532-9-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/5060-21-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2740 5060 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unrosed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3116 RegSvcs.exe 3116 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 5060 unrosed.exe 5060 unrosed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3116 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 5060 unrosed.exe 5060 unrosed.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 5060 unrosed.exe 5060 unrosed.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 532 wrote to memory of 5060 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 83 PID 532 wrote to memory of 5060 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 83 PID 532 wrote to memory of 5060 532 b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe 83 PID 5060 wrote to memory of 3116 5060 unrosed.exe 84 PID 5060 wrote to memory of 3116 5060 unrosed.exe 84 PID 5060 wrote to memory of 3116 5060 unrosed.exe 84 PID 5060 wrote to memory of 3116 5060 unrosed.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\chordates\unrosed.exe"C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 7523⤵
- Program crash
PID:2740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5060 -ip 50601⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804KB
MD54122c9b31ec914b161c2dddcb92e06bd
SHA1c973a177f213a01d5737eae7daf2f0a9598f7f92
SHA256b3d394b6cf7365519e9817ae52707443bba6d12a6054d1d6ca99012d6dafd014
SHA51274463d55e678707566112ff1598cd70da2bedb83dcc6945e8cce60c96157261f79c5bd0b9c3e711d7bd4cb14b64dcecb2655d93b27148a324ed7e0b69ec2549c