Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2025, 08:23

General

  • Target

    9b3c208aa85512eec82a737a073965e8.exe

  • Size

    700KB

  • MD5

    9b3c208aa85512eec82a737a073965e8

  • SHA1

    7e548d758f5041e07007b9f2ca735de675d68686

  • SHA256

    88d86232f29100795de49ec32dcfcd35ab34d6b7e1b1a61ecf33c4dc56e60a71

  • SHA512

    0acfc3312c61d354163999087d6c2e754cc2c48fcce331283adcb73eaf6a30b353a559fcb1770e96bfc667401b5e9df7cf5a681db7f2cf315f0eb47fa07c800e

  • SSDEEP

    12288:XT/rmFskovjlnpLJBUt9oMbBBDNnrkaCRUgU6gZaPTXVL:XTD3TL8t1hFMUHMPJL

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.concaribe.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    ro}UWgz#!38E

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b3c208aa85512eec82a737a073965e8.exe
    "C:\Users\Admin\AppData\Local\Temp\9b3c208aa85512eec82a737a073965e8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\AppData\Local\Temp\9b3c208aa85512eec82a737a073965e8.exe
      "C:\Users\Admin\AppData\Local\Temp\9b3c208aa85512eec82a737a073965e8.exe"
      2⤵
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsl953C.tmp\System.dll

    Filesize

    12KB

    MD5

    6e55a6e7c3fdbd244042eb15cb1ec739

    SHA1

    070ea80e2192abc42f358d47b276990b5fa285a9

    SHA256

    acf90ab6f4edc687e94aaf604d05e16e6cfb5e35873783b50c66f307a35c6506

    SHA512

    2d504b74da38edc967e3859733a2a9cacd885db82f0ca69bfb66872e882707314c54238344d45945dc98bae85772aceef71a741787922d640627d3c8ae8f1c35

  • C:\Users\Admin\Videos\rabbinat.ini

    Filesize

    37B

    MD5

    77e7b939ca90bd56fb6529cbd19b48da

    SHA1

    e04ee49434533f402a9efb1d1d1e2fb9458cd30d

    SHA256

    cffef7c1122622b6796879840f785add873f776a8f4d8734d29539f87ec1467a

    SHA512

    470323b1b5557043c62210a9f5af582438984d61cc4cad5bca20135938678a96f90934ad8fa2ad2539cf8a87cb62c1da2df6312c6952c78c793397dffbc6b34b

  • memory/4908-30-0x0000000076EA1000-0x0000000076FC1000-memory.dmp

    Filesize

    1.1MB

  • memory/4908-33-0x0000000000490000-0x00000000004D2000-memory.dmp

    Filesize

    264KB

  • memory/4908-42-0x00000000720E0000-0x0000000072890000-memory.dmp

    Filesize

    7.7MB

  • memory/4908-26-0x00000000016F0000-0x0000000006744000-memory.dmp

    Filesize

    80.3MB

  • memory/4908-27-0x0000000076F28000-0x0000000076F29000-memory.dmp

    Filesize

    4KB

  • memory/4908-28-0x0000000076F45000-0x0000000076F46000-memory.dmp

    Filesize

    4KB

  • memory/4908-29-0x0000000000490000-0x00000000016E4000-memory.dmp

    Filesize

    18.3MB

  • memory/4908-32-0x00000000720EE000-0x00000000720EF000-memory.dmp

    Filesize

    4KB

  • memory/4908-41-0x00000000720EE000-0x00000000720EF000-memory.dmp

    Filesize

    4KB

  • memory/4908-39-0x000000003A330000-0x000000003A33A000-memory.dmp

    Filesize

    40KB

  • memory/4908-34-0x00000000392B0000-0x0000000039854000-memory.dmp

    Filesize

    5.6MB

  • memory/4908-35-0x00000000067D0000-0x0000000006836000-memory.dmp

    Filesize

    408KB

  • memory/4908-36-0x00000000720E0000-0x0000000072890000-memory.dmp

    Filesize

    7.7MB

  • memory/4908-31-0x00000000016F0000-0x0000000006744000-memory.dmp

    Filesize

    80.3MB

  • memory/4908-37-0x000000003A210000-0x000000003A260000-memory.dmp

    Filesize

    320KB

  • memory/4908-38-0x000000003A260000-0x000000003A2F2000-memory.dmp

    Filesize

    584KB

  • memory/5012-25-0x0000000074345000-0x0000000074346000-memory.dmp

    Filesize

    4KB

  • memory/5012-23-0x0000000076EA1000-0x0000000076FC1000-memory.dmp

    Filesize

    1.1MB

  • memory/5012-24-0x0000000076EA1000-0x0000000076FC1000-memory.dmp

    Filesize

    1.1MB