Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 01:23
Static task
static1
Behavioral task
behavioral1
Sample
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe
Resource
win7-20240903-en
General
-
Target
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe
-
Size
1.1MB
-
MD5
1f383b406074c2253d0e4a979703540d
-
SHA1
246c5ad4c8c719e430509dd7023536759cc2af6a
-
SHA256
444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d
-
SHA512
32b38a211f0abb8c68c93888ed8fa4234ff9e35073b94f4d8d665d82459bd6da15c0504d29728ea6bbfd6a4abd0e07ab538b2237800b85ae5624bf223a1d8ba9
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1WNQKlrjlg3p2JGLNx7qqN2O88:7JZoQrbTFZY1WNQKzg3p2cLNxuqoO9
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.antoniomayol.com:21 - Port:
21 - Username:
[email protected] - Password:
cMhKDQUk1{;%
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\unrosed.vbs unrosed.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 unrosed.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c8e-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 5096 2004 unrosed.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unrosed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5096 RegSvcs.exe 5096 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2004 unrosed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5096 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 2004 unrosed.exe 2004 unrosed.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 2004 unrosed.exe 2004 unrosed.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4316 wrote to memory of 2004 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 83 PID 4316 wrote to memory of 2004 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 83 PID 4316 wrote to memory of 2004 4316 444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe 83 PID 2004 wrote to memory of 5096 2004 unrosed.exe 84 PID 2004 wrote to memory of 5096 2004 unrosed.exe 84 PID 2004 wrote to memory of 5096 2004 unrosed.exe 84 PID 2004 wrote to memory of 5096 2004 unrosed.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe"C:\Users\Admin\AppData\Local\Temp\444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\chordates\unrosed.exe"C:\Users\Admin\AppData\Local\Temp\444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51f383b406074c2253d0e4a979703540d
SHA1246c5ad4c8c719e430509dd7023536759cc2af6a
SHA256444a5f9a40e319beb2b062de6e9c776f6fbaceb2ca588f92d6651a8fdf46e69d
SHA51232b38a211f0abb8c68c93888ed8fa4234ff9e35073b94f4d8d665d82459bd6da15c0504d29728ea6bbfd6a4abd0e07ab538b2237800b85ae5624bf223a1d8ba9