Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe
-
Size
1.6MB
-
MD5
eb0d5f4c87b4b129cc70280695ef7039
-
SHA1
f6a05c2eaadc051308604bbb0a61195084ea2a3b
-
SHA256
3d87032556ac1435e7db7bb2c3b553f4c2fefbf7b85455314f5ccf135d705ba1
-
SHA512
5bb6633c6e7de4ae218663a07dffc6a6c14ae76489ce5d6c4b98fcd061bccc8e0d488f52be313fa0c6b5a2d9b50d69d51bd3226bc79f85ac605ae4718c457a37
-
SSDEEP
24576:6NA3R5drX+dCfpuablsu4j0K2Dlu1m00/Gmo9z1Aj3eJ0zj:z52iJcj0g1m00Iz1Aj3uu
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral2/memory/4372-147-0x00000000009B0000-0x00000000019B0000-memory.dmp family_agenttesla behavioral2/memory/4372-149-0x00000000009B0000-0x0000000000A0A000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe -
Executes dropped EXE 1 IoCs
pid Process 3796 uuaamnjx.bat -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\80749327\\uuaamnjx.bat C:\\Users\\Admin\\AppData\\Local\\Temp\\80749327\\SNEUDD~1.ONP" uuaamnjx.bat -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 checkip.amazonaws.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3796 set thread context of 4372 3796 uuaamnjx.bat 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuaamnjx.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 4372 RegSvcs.exe 4372 RegSvcs.exe 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat 3796 uuaamnjx.bat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4372 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4372 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5040 wrote to memory of 3796 5040 2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe 89 PID 5040 wrote to memory of 3796 5040 2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe 89 PID 5040 wrote to memory of 3796 5040 2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe 89 PID 3796 wrote to memory of 4372 3796 uuaamnjx.bat 98 PID 3796 wrote to memory of 4372 3796 uuaamnjx.bat 98 PID 3796 wrote to memory of 4372 3796 uuaamnjx.bat 98 PID 3796 wrote to memory of 4372 3796 uuaamnjx.bat 98 PID 3796 wrote to memory of 4372 3796 uuaamnjx.bat 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-29_eb0d5f4c87b4b129cc70280695ef7039_black-basta_luca-stealer_metamorfo.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\80749327\uuaamnjx.bat"C:\Users\Admin\AppData\Local\Temp\80749327\uuaamnjx.bat" sneuddpis.onp2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\80749327\uuaamnjx.bat C:\Users\Admin\AppData\Local\Temp\80749327\SNEUDD~1.ONP1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
737KB
MD590c98f7c66a2781b4761de08e750f769
SHA17afc778512a6ab4804821559f688d4aa583176f8
SHA256f44c31ccf0a90cf1a0be8ad2c09fc51a3992f7b567c6b0b99edca06f548a868c
SHA5127f5fb17920db49dec43c92b3f640c384b23f72c51886fb5bf29d95a8dac9b3a38480e7c56505f197d1522861f1e67f600648d933b6e961e386472b00bf6f9017
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59