Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 01:29
Static task
static1
Behavioral task
behavioral1
Sample
Dhl shipment documents 00020494940050509606000.exe
Resource
win7-20240903-en
General
-
Target
Dhl shipment documents 00020494940050509606000.exe
-
Size
476KB
-
MD5
e045c8326ee8ee3a255224d143be1c01
-
SHA1
b2d23c0a444317b06a6f2339df790a49dd6d994c
-
SHA256
1f7c1d0d5149d693543f2788b8a4e5c64864077b0617c40ac9d90437d2fcd947
-
SHA512
8c3a92f558ec3364c571dd5864ffef8d21d888923ac103e1824ac646aa3b2073479d50c1178e94c2e1269289e347f9e0f4d6aee89a3277ff9117718089d66c40
-
SSDEEP
12288:KnU51Fb/VSUE9H2sHHVsgQt/1+1hzWXp8NDc:0F1HHVs7tA1ZWXp
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 768 set thread context of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl shipment documents 00020494940050509606000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhl shipment documents 00020494940050509606000.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 Dhl shipment documents 00020494940050509606000.exe 2540 Dhl shipment documents 00020494940050509606000.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 Dhl shipment documents 00020494940050509606000.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30 PID 768 wrote to memory of 2540 768 Dhl shipment documents 00020494940050509606000.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 00020494940050509606000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 00020494940050509606000.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 00020494940050509606000.exe"C:\Users\Admin\AppData\Local\Temp\Dhl shipment documents 00020494940050509606000.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-