Analysis
-
max time kernel
16s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 01:10
Behavioral task
behavioral1
Sample
eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe
Resource
win7-20240729-en
General
-
Target
eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe
-
Size
863KB
-
MD5
0bb260c0fa360e59553b86a7d94bd09a
-
SHA1
ddfdb07448646aefaeeb749b517740d5d06484c2
-
SHA256
eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8
-
SHA512
604e774697a17f16b2c15a06a8c752080554c4f11812d5eb56ae3d3e19887592c4c442f706201f4ca951e8a0640007386ab70a47c0e959b4f6b3721ca823dc56
-
SSDEEP
24576:0q5TfcdHj4fmb1MczV8fogZWI21u1ohRZM3HAw:0UTsam/b+Wc+nM3
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Melba.vbs Melba.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 Melba.exe -
Loads dropped DLL 1 IoCs
pid Process 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2312-12-0x00000000011C0000-0x00000000013A1000-memory.dmp autoit_exe behavioral1/memory/2524-11-0x0000000000FD0000-0x00000000011B1000-memory.dmp autoit_exe behavioral1/memory/2312-25-0x00000000011C0000-0x00000000013A1000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 2696 2312 Melba.exe 30 -
resource yara_rule behavioral1/memory/2524-0-0x0000000000FD0000-0x00000000011B1000-memory.dmp upx behavioral1/files/0x00070000000193f7-5.dat upx behavioral1/memory/2312-12-0x00000000011C0000-0x00000000013A1000-memory.dmp upx behavioral1/memory/2524-11-0x0000000000FD0000-0x00000000011B1000-memory.dmp upx behavioral1/memory/2524-8-0x0000000002F80000-0x0000000003161000-memory.dmp upx behavioral1/memory/2312-25-0x00000000011C0000-0x00000000013A1000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Melba.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 RegSvcs.exe 2696 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2312 Melba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 2312 Melba.exe 2312 Melba.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 2312 Melba.exe 2312 Melba.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2312 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 29 PID 2524 wrote to memory of 2312 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 29 PID 2524 wrote to memory of 2312 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 29 PID 2524 wrote to memory of 2312 2524 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 29 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30 PID 2312 wrote to memory of 2696 2312 Melba.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\flexuosely\Melba.exe"C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
863KB
MD50bb260c0fa360e59553b86a7d94bd09a
SHA1ddfdb07448646aefaeeb749b517740d5d06484c2
SHA256eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8
SHA512604e774697a17f16b2c15a06a8c752080554c4f11812d5eb56ae3d3e19887592c4c442f706201f4ca951e8a0640007386ab70a47c0e959b4f6b3721ca823dc56