Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 01:20
Static task
static1
Behavioral task
behavioral1
Sample
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
Resource
win10v2004-20241007-en
General
-
Target
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe
-
Size
854KB
-
MD5
c583ce216c5a0a982d0aa8ccb8956d5d
-
SHA1
595f8330a3da759f08fe0b59d5b46aaf54071684
-
SHA256
f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
-
SHA512
4f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79
-
SSDEEP
12288:6cbLIx2zGRbVk69o340h2x4ZydRXLzT6wpPzOK3q:62fex79ooomNLiwzOK6
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023c82-16.dat family_agenttesla behavioral2/memory/2348-27-0x0000000000460000-0x00000000004BA000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 tmp.exe 1748 .exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmp.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1532 set thread context of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 1748 .exe 2348 tmp.exe 2348 tmp.exe 1748 .exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Token: 33 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Token: SeIncBasePriorityPrivilege 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe Token: SeDebugPrivilege 1748 .exe Token: SeDebugPrivilege 2348 tmp.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1532 wrote to memory of 3536 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 83 PID 1532 wrote to memory of 3536 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 83 PID 1532 wrote to memory of 3536 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 83 PID 1532 wrote to memory of 3324 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 85 PID 1532 wrote to memory of 3324 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 85 PID 1532 wrote to memory of 3324 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 85 PID 3324 wrote to memory of 1460 3324 cmd.exe 87 PID 3324 wrote to memory of 1460 3324 cmd.exe 87 PID 3324 wrote to memory of 1460 3324 cmd.exe 87 PID 1532 wrote to memory of 4936 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 88 PID 1532 wrote to memory of 4936 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 88 PID 1532 wrote to memory of 4936 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 88 PID 1532 wrote to memory of 4828 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 90 PID 1532 wrote to memory of 4828 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 90 PID 1532 wrote to memory of 4828 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 90 PID 1532 wrote to memory of 2348 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 92 PID 1532 wrote to memory of 2348 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 92 PID 1532 wrote to memory of 2348 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 92 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 PID 1532 wrote to memory of 1748 1532 f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 .exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe"C:\Users\Admin\AppData\Local\Temp\f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885.exe" "%appdata%\FolderN\name.exe" /Y2⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%appdata%\FolderN\name.exe.lnk" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %appdata%\FolderN\name.exe:Zone.Identifier2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ren "%appdata%\FolderN\name.exe.jpg" name.exe2⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be
-
Filesize
854KB
MD5c583ce216c5a0a982d0aa8ccb8956d5d
SHA1595f8330a3da759f08fe0b59d5b46aaf54071684
SHA256f4f1e1c6398caa87b8f31f57b0154af5a2928e4cd4ab3e963ba38fff3166d885
SHA5124f4e4c6148b2bd1ea89ebf7725951120e16342e96efd62bea03692d0bdfa8742db5161f8441d3409e934c2aad97ff3b6cba4b4d57c33d3a6b774999d3747ca79
-
Filesize
333KB
MD5f0fdcbabaec0b4cf9aeaccbfb697ee97
SHA14edbdaca86e334cb496be79a5a6fce1462f26bfb
SHA25618ef59b5fa921966f0432e8ee410762d271207d98241d426543f55b650c249f6
SHA51224c60782f8e71e553499b048a10d243e7beac7358e9767c2f683f81c8e4927b1fa7fd1f33c9d4a0876f24eced9c0f7b7894b4e2b94fdb26bd88aca11ac3cb5f3