Analysis
-
max time kernel
150s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 09:02
Static task
static1
Behavioral task
behavioral1
Sample
RICEVUTA DI PAGAMENTO.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RICEVUTA DI PAGAMENTO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
RICEVUTA DI PAGAMENTO.exe
-
Size
674KB
-
MD5
ef5b44f40df78dc49c1180b671a7d089
-
SHA1
0707aa3c6ae1abc38d08618132453e89f1b54c5a
-
SHA256
687b2c10e61814fa7b2b3ae17c8a2f04fef5b3ddbfd12bba5948a7377b26afde
-
SHA512
2919e804a8f92c05c3375e142e3657249acc2f267339a61ceaed791b33ed758c1c1563afd420c43856c00c4437dddfd898f4af04fe65cddb67cc774c742dc2e8
-
SSDEEP
12288:GFgYxnPNPMRLsNcVRa+zXQOV51P9hg2RATP:aVSRLsNp2Tz2
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2044 RICEVUTA DI PAGAMENTO.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3040 RICEVUTA DI PAGAMENTO.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2044 RICEVUTA DI PAGAMENTO.exe 3040 RICEVUTA DI PAGAMENTO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RICEVUTA DI PAGAMENTO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RICEVUTA DI PAGAMENTO.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 RICEVUTA DI PAGAMENTO.exe 3040 RICEVUTA DI PAGAMENTO.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2044 RICEVUTA DI PAGAMENTO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 RICEVUTA DI PAGAMENTO.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3040 2044 RICEVUTA DI PAGAMENTO.exe 30 PID 2044 wrote to memory of 3040 2044 RICEVUTA DI PAGAMENTO.exe 30 PID 2044 wrote to memory of 3040 2044 RICEVUTA DI PAGAMENTO.exe 30 PID 2044 wrote to memory of 3040 2044 RICEVUTA DI PAGAMENTO.exe 30 PID 2044 wrote to memory of 3040 2044 RICEVUTA DI PAGAMENTO.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0