Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 03:59

General

  • Target

    a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe

  • Size

    1.5MB

  • MD5

    2bded61228ad804396f40371d93a283e

  • SHA1

    8da4b8e78fe3b6f124b38d3b1c67557c23a4f5fd

  • SHA256

    a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad

  • SHA512

    95de0bf6b37b548287ba5c7ec14f3ed750f9607495b790b1907b4a6a90a9ab6caa8bbdf9ddd78d000de64fc04b8f884ba2fa7ab7e43c29a12f356858c3873da1

  • SSDEEP

    24576:Gtb20pkaCqT5TBWgNQ7aGob0e9op0LCpoDg4+iOw6A:zVg5tQ7aGiPagCes4+ir5

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe
    "C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe"
      2⤵
        PID:4244
      • C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe
        "C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe"
          3⤵
            PID:2012
          • C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe
            "C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4448
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\a143be8339372fcc4a8165466584453a9399dbf3adec6fc458932aba3a06bfad.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3672-57-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-1075-0x0000000006420000-0x000000000642A000-memory.dmp

        Filesize

        40KB

      • memory/3672-1076-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3672-11-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3672-12-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3672-14-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3672-13-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3672-15-0x0000000002DC0000-0x0000000002E16000-memory.dmp

        Filesize

        344KB

      • memory/3672-16-0x00000000059A0000-0x0000000005F44000-memory.dmp

        Filesize

        5.6MB

      • memory/3672-17-0x0000000005380000-0x00000000053D4000-memory.dmp

        Filesize

        336KB

      • memory/3672-25-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-33-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-77-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-75-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-73-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-69-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-55-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-65-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-63-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-61-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-59-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-53-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-51-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-1074-0x00000000064A0000-0x0000000006532000-memory.dmp

        Filesize

        584KB

      • memory/3672-67-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-47-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-45-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-39-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-37-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-35-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-31-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-29-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-27-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-23-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-71-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-49-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-43-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-41-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-21-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-19-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-18-0x0000000005380000-0x00000000053CE000-memory.dmp

        Filesize

        312KB

      • memory/3672-1072-0x0000000005590000-0x00000000055F6000-memory.dmp

        Filesize

        408KB

      • memory/3672-1073-0x00000000063B0000-0x0000000006400000-memory.dmp

        Filesize

        320KB

      • memory/3896-2-0x0000000004570000-0x0000000004670000-memory.dmp

        Filesize

        1024KB

      • memory/4448-10-0x0000000001710000-0x0000000001B10000-memory.dmp

        Filesize

        4.0MB

      • memory/4824-6-0x0000000003720000-0x0000000003820000-memory.dmp

        Filesize

        1024KB