Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe
Resource
win10v2004-20240508-en
General
-
Target
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe
-
Size
1.4MB
-
MD5
e1588f75f06d249baf1761e572233d12
-
SHA1
7b8c3cf2000affbfdeb15807e4bb1048debf1e16
-
SHA256
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701
-
SHA512
0ebd6a10ea0979088e4fabbda01fec2c29bbec07d8c519eb2ed4ef600c53e6639eda45be76a6f849d57b2fc7c993023ffc9b32343bd58187d3e536a58bbd1cdb
-
SSDEEP
24576:cAHnh+eWsN3skA4RV1Hom2KXMmHajyYady5ebPIxn5or5:7h+ZkldoPK8YajdadhGw
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exedescription pid process target process PID 2808 set thread context of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1076 2808 WerFault.exe 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 1880 RegSvcs.exe 1880 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exepid process 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 1880 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exepid process 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exepid process 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exedescription pid process target process PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1880 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe RegSvcs.exe PID 2808 wrote to memory of 1076 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe WerFault.exe PID 2808 wrote to memory of 1076 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe WerFault.exe PID 2808 wrote to memory of 1076 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe WerFault.exe PID 2808 wrote to memory of 1076 2808 4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe"C:\Users\Admin\AppData\Local\Temp\4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\4c0dca6d29a7ef1153f8f730ec934571c5b0be25b43f6096ff26e143f6d8b701.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 3162⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\uppishlyFilesize
261KB
MD500c414bc939b1f92a1f13d13d31eddc0
SHA1167ba7d6f5564d03f782951465dfa588b061bb47
SHA25620efb0215d1280eca34972f547b030a578c2b93c44a51da4bd7325d1e5eea23b
SHA51243dd759e197e05f550512ec70bff23596cd5cba9e6b4ab21bf65b94f157b869f4bcb01485da3374708ed80a1df095f4fdda3aa6c811a944e0303ae4b7affe76b
-
memory/1880-44-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-15-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1880-14-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1880-1054-0x0000000074A60000-0x000000007514E000-memory.dmpFilesize
6.9MB
-
memory/1880-16-0x0000000074A6E000-0x0000000074A6F000-memory.dmpFilesize
4KB
-
memory/1880-17-0x0000000002040000-0x0000000002094000-memory.dmpFilesize
336KB
-
memory/1880-18-0x0000000002090000-0x00000000020E2000-memory.dmpFilesize
328KB
-
memory/1880-19-0x0000000074A60000-0x000000007514E000-memory.dmpFilesize
6.9MB
-
memory/1880-20-0x0000000074A60000-0x000000007514E000-memory.dmpFilesize
6.9MB
-
memory/1880-22-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-46-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-42-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-40-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-54-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-60-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-58-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-56-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-52-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-68-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-48-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-32-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-12-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1880-50-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-38-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-30-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-28-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-26-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-24-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-21-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-34-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-36-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-62-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-80-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-78-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-76-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-74-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-72-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-1051-0x0000000074A60000-0x000000007514E000-memory.dmpFilesize
6.9MB
-
memory/1880-1052-0x0000000074A60000-0x000000007514E000-memory.dmpFilesize
6.9MB
-
memory/1880-70-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-66-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-64-0x0000000002090000-0x00000000020DD000-memory.dmpFilesize
308KB
-
memory/1880-1053-0x0000000074A6E000-0x0000000074A6F000-memory.dmpFilesize
4KB
-
memory/2808-11-0x00000000001F0000-0x00000000001F4000-memory.dmpFilesize
16KB