Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 01:20
Static task
static1
Behavioral task
behavioral1
Sample
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
Resource
win10v2004-20241007-en
General
-
Target
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
-
Size
854KB
-
MD5
c583ce216c5a0a982d0aa8ccb8956d5d
-
SHA1
595f8330a3da759f08fe0b59d5b46aaf54071684
-
SHA256
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
-
SHA512
4f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79
-
SSDEEP
12288:6cbLIx2zGRbVk69o340h2x4ZydRXLzT6wpPzOK3q:62fex79ooomNLiwzOK6
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 7 IoCs
resource yara_rule behavioral1/files/0x00060000000193c4-12.dat family_agenttesla behavioral1/memory/3060-18-0x0000000000DB0000-0x0000000000E0A000-memory.dmp family_agenttesla behavioral1/memory/2644-40-0x0000000000080000-0x00000000000DA000-memory.dmp family_agenttesla behavioral1/memory/2644-37-0x0000000000080000-0x00000000000DA000-memory.dmp family_agenttesla behavioral1/memory/2644-33-0x0000000000080000-0x00000000000DA000-memory.dmp family_agenttesla behavioral1/memory/2644-28-0x0000000000080000-0x00000000000DA000-memory.dmp family_agenttesla behavioral1/memory/2644-26-0x0000000000080000-0x00000000000DA000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 3060 tmp.exe 2644 .exe -
Loads dropped DLL 3 IoCs
pid Process 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 3060 tmp.exe 3060 tmp.exe 2644 .exe 2644 .exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Token: 33 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Token: SeIncBasePriorityPrivilege 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Token: SeDebugPrivilege 3060 tmp.exe Token: SeDebugPrivilege 2644 .exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2284 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 31 PID 2124 wrote to memory of 2284 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 31 PID 2124 wrote to memory of 2284 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 31 PID 2124 wrote to memory of 2284 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 31 PID 2124 wrote to memory of 2180 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 33 PID 2124 wrote to memory of 2180 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 33 PID 2124 wrote to memory of 2180 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 33 PID 2124 wrote to memory of 2180 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 33 PID 2180 wrote to memory of 2316 2180 cmd.exe 35 PID 2180 wrote to memory of 2316 2180 cmd.exe 35 PID 2180 wrote to memory of 2316 2180 cmd.exe 35 PID 2180 wrote to memory of 2316 2180 cmd.exe 35 PID 2124 wrote to memory of 1900 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 36 PID 2124 wrote to memory of 1900 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 36 PID 2124 wrote to memory of 1900 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 36 PID 2124 wrote to memory of 1900 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 36 PID 2124 wrote to memory of 2872 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 38 PID 2124 wrote to memory of 2872 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 38 PID 2124 wrote to memory of 2872 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 38 PID 2124 wrote to memory of 2872 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 38 PID 2124 wrote to memory of 3060 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 40 PID 2124 wrote to memory of 3060 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 40 PID 2124 wrote to memory of 3060 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 40 PID 2124 wrote to memory of 3060 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 40 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 PID 2124 wrote to memory of 2644 2124 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 41 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe"C:\Users\Admin\AppData\Local\Temp\f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe" "%appdata%\FolderN\name.exe" /Y2⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%appdata%\FolderN\name.exe.lnk" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %appdata%\FolderN\name.exe:Zone.Identifier2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ren "%appdata%\FolderN\name.exe.jpg" name.exe2⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854KB
MD5c583ce216c5a0a982d0aa8ccb8956d5d
SHA1595f8330a3da759f08fe0b59d5b46aaf54071684
SHA256f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
SHA5124f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79
-
Filesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
Filesize
333KB
MD5f0fdcbabaec0b4cf9aeaccbfb697ee97
SHA14edbdaca86e334cb496be79a5a6fce1462f26bfb
SHA25618ef59b5fa921966f0432e8ee410762d271207d98241d426543f55b650c249f6
SHA51224c60782f8e71e553499b048a10d243e7beac7358e9767c2f683f81c8e4927b1fa7fd1f33c9d4a0876f24eced9c0f7b7894b4e2b94fdb26bd88aca11ac3cb5f3