Analysis
-
max time kernel
295s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/02/2025, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
RICEVUTA DI PAGAMENTO.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RICEVUTA DI PAGAMENTO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
RICEVUTA DI PAGAMENTO.exe
-
Size
1.3MB
-
MD5
f8918c093f62e7df3a88f3c55e5c62da
-
SHA1
5ece572d3d72558a1c044251cd521dd5e369a727
-
SHA256
356fd7a50b9d0c286d7251ede5b8e8ed9ec8c51a4480a88d5e054e52d352fec3
-
SHA512
462bfee0c1158847545a696e0354c4ca581f09ba822be2fe148e324fc21e5d04eac231de92674e30e962244d9dbf2ee2b1bb98ff8bcc095b109995ce54045298
-
SSDEEP
24576:iU9aY1wLhuxBr8sDzsKc4nVjhNW3CknC7/c2nEwRTPlJpDOPCBeuOHHTDf7:iNY1tpzsKc4nthNW3YU0E6DpDOPCBZOj
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.concaribe.com - Port:
21 - Username:
[email protected] - Password:
ro}UWgz#!38E
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2400 RICEVUTA DI PAGAMENTO.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 5 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2812 RICEVUTA DI PAGAMENTO.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2400 RICEVUTA DI PAGAMENTO.exe 2812 RICEVUTA DI PAGAMENTO.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\mesanmast\lindre.sum RICEVUTA DI PAGAMENTO.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RICEVUTA DI PAGAMENTO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RICEVUTA DI PAGAMENTO.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 RICEVUTA DI PAGAMENTO.exe 2812 RICEVUTA DI PAGAMENTO.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2400 RICEVUTA DI PAGAMENTO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2812 RICEVUTA DI PAGAMENTO.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2812 2400 RICEVUTA DI PAGAMENTO.exe 31 PID 2400 wrote to memory of 2812 2400 RICEVUTA DI PAGAMENTO.exe 31 PID 2400 wrote to memory of 2812 2400 RICEVUTA DI PAGAMENTO.exe 31 PID 2400 wrote to memory of 2812 2400 RICEVUTA DI PAGAMENTO.exe 31 PID 2400 wrote to memory of 2812 2400 RICEVUTA DI PAGAMENTO.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"C:\Users\Admin\AppData\Local\Temp\RICEVUTA DI PAGAMENTO.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c