Resubmissions
28/03/2025, 20:04
250328-ytek4ssmw3 10Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
OC 129075-JG-3229-password(RqGrWIuP).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5c342a67e23ea4068d59c306a508fef4017f0d3523e48bae5eec7e8ab3fcd5d.eml
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
OC 129075-JG-3229.rar
Resource
win7-20241010-en
General
-
Target
OC 129075-JG-3229.rar
-
Size
550KB
-
MD5
92ca133e27d245b891b865b36a8eaacc
-
SHA1
b945e869e422f972cf23370fec8c9f141a174c7a
-
SHA256
36fe9874c1c7e5c083ca7780dfe57018f5057ca1989472132a2d877409cb1f78
-
SHA512
494e7a820fc034a61f15fa7f77035f95a56b9b33fcb17af97b9b2bbddffad181a9492fcaf318284b8912d1f1f1c07be31611ee60864076eebcfadea3696944be
-
SSDEEP
12288:llOdZ9ZUIZ7vBN/2aS5LuYBlcCUf03KQMIKml77EG:l4dpBOhP0fJ7ml77
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE 7 IoCs
pid Process 2064 OC 129075-JG-3229.exe 2740 OC 129075-JG-3229.exe 1616 OC 129075-JG-3229.exe 2476 OC 129075-JG-3229.exe 2164 OC 129075-JG-3229.exe 1956 OC 129075-JG-3229.exe 1540 OC 129075-JG-3229.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/files/0x000a00000001202c-4.dat autoit_exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2064 set thread context of 2784 2064 OC 129075-JG-3229.exe 32 PID 2740 set thread context of 2908 2740 OC 129075-JG-3229.exe 35 PID 1616 set thread context of 2664 1616 OC 129075-JG-3229.exe 37 PID 2476 set thread context of 2248 2476 OC 129075-JG-3229.exe 39 PID 2164 set thread context of 696 2164 OC 129075-JG-3229.exe 41 PID 1956 set thread context of 540 1956 OC 129075-JG-3229.exe 44 PID 1540 set thread context of 2756 1540 OC 129075-JG-3229.exe 45 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OC 129075-JG-3229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2000 7zFM.exe 2784 RegSvcs.exe 2784 RegSvcs.exe 2000 7zFM.exe 2908 RegSvcs.exe 2908 RegSvcs.exe 2000 7zFM.exe 2000 7zFM.exe 2664 RegSvcs.exe 2664 RegSvcs.exe 2000 7zFM.exe 2000 7zFM.exe 2248 RegSvcs.exe 2248 RegSvcs.exe 2000 7zFM.exe 2000 7zFM.exe 696 RegSvcs.exe 696 RegSvcs.exe 2000 7zFM.exe 2000 7zFM.exe 540 RegSvcs.exe 540 RegSvcs.exe 2000 7zFM.exe 2000 7zFM.exe 2000 7zFM.exe 2756 RegSvcs.exe 2756 RegSvcs.exe 2000 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 7zFM.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2064 OC 129075-JG-3229.exe 2064 OC 129075-JG-3229.exe 2740 OC 129075-JG-3229.exe 1616 OC 129075-JG-3229.exe 2476 OC 129075-JG-3229.exe 2164 OC 129075-JG-3229.exe 1956 OC 129075-JG-3229.exe 1540 OC 129075-JG-3229.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 2000 7zFM.exe Token: 35 2000 7zFM.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeDebugPrivilege 2784 RegSvcs.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeDebugPrivilege 2908 RegSvcs.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeDebugPrivilege 2664 RegSvcs.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeDebugPrivilege 2248 RegSvcs.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeDebugPrivilege 696 RegSvcs.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeSecurityPrivilege 2000 7zFM.exe Token: SeDebugPrivilege 540 RegSvcs.exe Token: SeDebugPrivilege 2756 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 2000 7zFM.exe 2000 7zFM.exe 2064 OC 129075-JG-3229.exe 2064 OC 129075-JG-3229.exe 2000 7zFM.exe 2740 OC 129075-JG-3229.exe 2740 OC 129075-JG-3229.exe 2000 7zFM.exe 1616 OC 129075-JG-3229.exe 1616 OC 129075-JG-3229.exe 2000 7zFM.exe 2476 OC 129075-JG-3229.exe 2476 OC 129075-JG-3229.exe 2000 7zFM.exe 2000 7zFM.exe 2164 OC 129075-JG-3229.exe 2164 OC 129075-JG-3229.exe 2000 7zFM.exe 1956 OC 129075-JG-3229.exe 1956 OC 129075-JG-3229.exe 2000 7zFM.exe 1540 OC 129075-JG-3229.exe 1540 OC 129075-JG-3229.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2064 OC 129075-JG-3229.exe 2064 OC 129075-JG-3229.exe 2740 OC 129075-JG-3229.exe 2740 OC 129075-JG-3229.exe 1616 OC 129075-JG-3229.exe 1616 OC 129075-JG-3229.exe 2476 OC 129075-JG-3229.exe 2476 OC 129075-JG-3229.exe 2164 OC 129075-JG-3229.exe 2164 OC 129075-JG-3229.exe 1956 OC 129075-JG-3229.exe 1956 OC 129075-JG-3229.exe 1540 OC 129075-JG-3229.exe 1540 OC 129075-JG-3229.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2064 2000 7zFM.exe 31 PID 2000 wrote to memory of 2064 2000 7zFM.exe 31 PID 2000 wrote to memory of 2064 2000 7zFM.exe 31 PID 2000 wrote to memory of 2064 2000 7zFM.exe 31 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2064 wrote to memory of 2784 2064 OC 129075-JG-3229.exe 32 PID 2000 wrote to memory of 2740 2000 7zFM.exe 34 PID 2000 wrote to memory of 2740 2000 7zFM.exe 34 PID 2000 wrote to memory of 2740 2000 7zFM.exe 34 PID 2000 wrote to memory of 2740 2000 7zFM.exe 34 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2740 wrote to memory of 2908 2740 OC 129075-JG-3229.exe 35 PID 2000 wrote to memory of 1616 2000 7zFM.exe 36 PID 2000 wrote to memory of 1616 2000 7zFM.exe 36 PID 2000 wrote to memory of 1616 2000 7zFM.exe 36 PID 2000 wrote to memory of 1616 2000 7zFM.exe 36 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 1616 wrote to memory of 2664 1616 OC 129075-JG-3229.exe 37 PID 2000 wrote to memory of 2476 2000 7zFM.exe 38 PID 2000 wrote to memory of 2476 2000 7zFM.exe 38 PID 2000 wrote to memory of 2476 2000 7zFM.exe 38 PID 2000 wrote to memory of 2476 2000 7zFM.exe 38 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2476 wrote to memory of 2248 2476 OC 129075-JG-3229.exe 39 PID 2000 wrote to memory of 2164 2000 7zFM.exe 40 PID 2000 wrote to memory of 2164 2000 7zFM.exe 40 PID 2000 wrote to memory of 2164 2000 7zFM.exe 40 PID 2000 wrote to memory of 2164 2000 7zFM.exe 40 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2164 wrote to memory of 696 2164 OC 129075-JG-3229.exe 41 PID 2000 wrote to memory of 1956 2000 7zFM.exe 42 PID 2000 wrote to memory of 1956 2000 7zFM.exe 42 PID 2000 wrote to memory of 1956 2000 7zFM.exe 42 PID 2000 wrote to memory of 1956 2000 7zFM.exe 42
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\OC 129075-JG-3229.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\7zO0D7A2137\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7A2137\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7A2137\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0D7AB817\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7AB817\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7AB817\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0D7EDC67\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7EDC67\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7EDC67\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0D7B8B67\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7B8B67\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7B8B67\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0D78BA28\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D78BA28\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D78BA28\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0D764038\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D764038\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D764038\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0D7CE338\OC 129075-JG-3229.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7CE338\OC 129075-JG-3229.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\7zO0D7CE338\OC 129075-JG-3229.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5ca05eaa8df0531cb2f76d5a2baa5aaea
SHA1688adb6f0a0ab7f13d47d0c16326221e20fa7b10
SHA25666d7d602350b27bd25ca73436b6b7598c65e5022cc8062eb5c87dc604ab97952
SHA5123e59f0eefd60ac5783ab291e89484532f5bf6ab105f83a4f34099815b26375097cf984050f9b00e2c90631cb07b600aa18cba3b93f24b1f4e2d6447a1e7cfdf0
-
Filesize
150KB
MD516011a9ae2a7fdc9e7e1612b4efe31ae
SHA1d1f62aee7e0396d2e79035a0f8e7dded376636bb
SHA256e55515aab193ad5b319ded7db5213b44bd4a27feeaefc4f5d9db87f13d71bb48
SHA5123def9623ce8a4bb99f522d4e2da4c0b7e4328edc874f509d0d4982845a56cc2310f10d8f85c1c30697454a575d759ffb5d9d4b83d42358f9a6983eb0e4eecd46
-
Filesize
238KB
MD5e858a08a8daa5d4f830d579cc04731ce
SHA177f557077dc8bcafd75574da1a1e47d8bc5c9f16
SHA2562313d87b359da4dedaf95fa676d92ff55b431fd764f8c409aa5e04a4078eef5d
SHA512f671a3d380bcce1c5c0058e4b5cc13cb6fe607006e5ca6291a152cf67b04d945ea0fee0065c4b510f52b4722a8f37ff44797e9661ad05348ed3d7f29403c6908