Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 01:10
Behavioral task
behavioral1
Sample
eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe
Resource
win7-20240729-en
General
-
Target
eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe
-
Size
863KB
-
MD5
0bb260c0fa360e59553b86a7d94bd09a
-
SHA1
ddfdb07448646aefaeeb749b517740d5d06484c2
-
SHA256
eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8
-
SHA512
604e774697a17f16b2c15a06a8c752080554c4f11812d5eb56ae3d3e19887592c4c442f706201f4ca951e8a0640007386ab70a47c0e959b4f6b3721ca823dc56
-
SSDEEP
24576:0q5TfcdHj4fmb1MczV8fogZWI21u1ohRZM3HAw:0UTsam/b+Wc+nM3
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Melba.vbs Melba.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 Melba.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3160-10-0x00000000009E0000-0x0000000000BC1000-memory.dmp autoit_exe behavioral2/memory/2044-14-0x0000000001880000-0x0000000001C80000-memory.dmp autoit_exe behavioral2/memory/2044-18-0x0000000000C80000-0x0000000000E61000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 3300 2044 Melba.exe 85 -
resource yara_rule behavioral2/memory/3160-0-0x00000000009E0000-0x0000000000BC1000-memory.dmp upx behavioral2/files/0x0007000000023ce2-6.dat upx behavioral2/memory/2044-7-0x0000000000C80000-0x0000000000E61000-memory.dmp upx behavioral2/memory/3160-10-0x00000000009E0000-0x0000000000BC1000-memory.dmp upx behavioral2/memory/2044-18-0x0000000000C80000-0x0000000000E61000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Melba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 RegSvcs.exe 3300 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2044 Melba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3300 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 2044 Melba.exe 2044 Melba.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 2044 Melba.exe 2044 Melba.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3160 wrote to memory of 2044 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 84 PID 3160 wrote to memory of 2044 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 84 PID 3160 wrote to memory of 2044 3160 eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe 84 PID 2044 wrote to memory of 3300 2044 Melba.exe 85 PID 2044 wrote to memory of 3300 2044 Melba.exe 85 PID 2044 wrote to memory of 3300 2044 Melba.exe 85 PID 2044 wrote to memory of 3300 2044 Melba.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\flexuosely\Melba.exe"C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
863KB
MD50bb260c0fa360e59553b86a7d94bd09a
SHA1ddfdb07448646aefaeeb749b517740d5d06484c2
SHA256eacf712d6ee65e4002090b5fd2629e97da8bf0b90de3cafb3a7a590cf84895a8
SHA512604e774697a17f16b2c15a06a8c752080554c4f11812d5eb56ae3d3e19887592c4c442f706201f4ca951e8a0640007386ab70a47c0e959b4f6b3721ca823dc56