Overview
overview
10Static
static
100d9e5116c1...e1.exe
windows7-x64
100d9e5116c1...e1.exe
windows10-2004-x64
10203dd97848...a7.exe
windows7-x64
1203dd97848...a7.exe
windows10-2004-x64
65d2a9e82b6...8f.exe
windows7-x64
75d2a9e82b6...8f.exe
windows10-2004-x64
7686e84d074...4d.exe
windows7-x64
686e84d074...4d.exe
windows10-2004-x64
ae30d28b17...a3.exe
windows7-x64
1ae30d28b17...a3.exe
windows10-2004-x64
6Analysis
-
max time kernel
99s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 05:52
Behavioral task
behavioral1
Sample
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
203dd97848f29e54a66e575ae670288e8fd4a5a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
203dd97848f29e54a66e575ae670288e8fd4a5a7.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
5d2a9e82b6098813fa230152de286f7712b5608f.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
5d2a9e82b6098813fa230152de286f7712b5608f.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
686e84d074c115785122ad304357729b28b4a54d.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
686e84d074c115785122ad304357729b28b4a54d.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
ae30d28b17fbce8e55203ad863c40bab8fe802a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ae30d28b17fbce8e55203ad863c40bab8fe802a3.exe
Resource
win10v2004-20220812-en
General
-
Target
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe
-
Size
334KB
-
MD5
584b853e5f597883fb56cc5e879d8a3d
-
SHA1
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1
-
SHA256
a73fd985f5f38ff58dc3112bc46d7e81190bad5567220cf46efe5608c4e307f0
-
SHA512
88b7f8c6fb7f9a19bbb9eb818cdbc51a3e95c25ba890eaf95576a3a9dd81ab7fbce5ef5bced6dbe16ff731e70c157f17276681fcd00205d280d1ec12bd6eea55
-
SSDEEP
6144:UmdOCKkkGBQOItDWaCjsjj9TB91goSjUOp0NMzh3HnzLkYvsbB:rdvkGBjADt8LtV8kn
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
magic4magic@yandex.com - Password:
magic123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyApp = "C:\\Users\\Admin\\AppData\\Roaming\\MyApp\\MyApp.exe" 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 checkip.amazonaws.com -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exepid process 1948 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe 1948 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exepid process 1948 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exedescription pid process Token: SeDebugPrivilege 1948 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exepid process 1948 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
outlook_office_path 1 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe -
outlook_win_path 1 IoCs
Processes:
0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe"C:\Users\Admin\AppData\Local\Temp\0d9e5116c1da200fa3a55c84ca2195eb7bbbd1e1.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path