Analysis
-
max time kernel
54s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe
Resource
win10v2004-20221111-en
General
-
Target
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe
-
Size
900KB
-
MD5
c68e2fbcf0d6aa032d875eda9d5064f1
-
SHA1
2a21c0df2831bf8b91c40031f9357afca0adfc72
-
SHA256
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
-
SHA512
c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
SSDEEP
6144:QRB3vG8NWZg1ekK2faTCrT8qi43C2bRjgDybJ6yiszBSN+kWAbjouwootyL:muc7KTqi4/pOybhiWBQuuwootyL
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-82-0x0000000000400000-0x0000000000471000-memory.dmp family_agenttesla behavioral1/memory/1708-83-0x0000000000400000-0x00000000004E2000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
Processes:
exxplorer.exeexxplorer.exepid process 1164 exxplorer.exe 1708 exxplorer.exe -
Loads dropped DLL 2 IoCs
Processes:
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exepid process 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
exxplorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 exxplorer.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 exxplorer.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 exxplorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Registry Key Name = "C:\\Users\\Admin\\subfolder\\exxplorer.vbs -rb" WScript.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exeexxplorer.exeexxplorer.exepid process 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe 1164 exxplorer.exe 1708 exxplorer.exe 1708 exxplorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
exxplorer.exedescription pid process target process PID 1164 set thread context of 1708 1164 exxplorer.exe exxplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
exxplorer.exepid process 1708 exxplorer.exe 1708 exxplorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
exxplorer.exedescription pid process Token: SeDebugPrivilege 1708 exxplorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exeexxplorer.exepid process 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe 1164 exxplorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
exxplorer.exepid process 1708 exxplorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exeexxplorer.exedescription pid process target process PID 1168 wrote to memory of 1920 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe WScript.exe PID 1168 wrote to memory of 1920 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe WScript.exe PID 1168 wrote to memory of 1920 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe WScript.exe PID 1168 wrote to memory of 1920 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe WScript.exe PID 1168 wrote to memory of 1164 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe exxplorer.exe PID 1168 wrote to memory of 1164 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe exxplorer.exe PID 1168 wrote to memory of 1164 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe exxplorer.exe PID 1168 wrote to memory of 1164 1168 aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe exxplorer.exe PID 1164 wrote to memory of 1708 1164 exxplorer.exe exxplorer.exe PID 1164 wrote to memory of 1708 1164 exxplorer.exe exxplorer.exe PID 1164 wrote to memory of 1708 1164 exxplorer.exe exxplorer.exe PID 1164 wrote to memory of 1708 1164 exxplorer.exe exxplorer.exe -
outlook_office_path 1 IoCs
Processes:
exxplorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 exxplorer.exe -
outlook_win_path 1 IoCs
Processes:
exxplorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 exxplorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe"C:\Users\Admin\AppData\Local\Temp\aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\subfolder\exxplorer.vbs"2⤵
- Adds Run key to start application
PID:1920 -
C:\Users\Admin\subfolder\exxplorer.exe"C:\Users\Admin\subfolder\exxplorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\subfolder\exxplorer.exe"C:\Users\Admin\subfolder\exxplorer.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- outlook_office_path
- outlook_win_path
PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5c68e2fbcf0d6aa032d875eda9d5064f1
SHA12a21c0df2831bf8b91c40031f9357afca0adfc72
SHA256aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
SHA512c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
Filesize
900KB
MD5c68e2fbcf0d6aa032d875eda9d5064f1
SHA12a21c0df2831bf8b91c40031f9357afca0adfc72
SHA256aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
SHA512c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
Filesize
900KB
MD5c68e2fbcf0d6aa032d875eda9d5064f1
SHA12a21c0df2831bf8b91c40031f9357afca0adfc72
SHA256aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
SHA512c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
Filesize
1020B
MD5668f506c439afb55333ce3f63411948d
SHA115001d94551585eb214ebaf016a6dd8e3b1e8330
SHA256ca65c8d391b536df542e2f9bdced0f1a1f72b70e6864b555cf11de64100e0986
SHA5121d902fdf07402483dd212bd3407e0a432bd6347bca620b2ff809d2659842bb16b627b488094798e3e0df6ca9a84f8be7cdfdf9998b65d2f255c29be26ee8bb0b
-
Filesize
900KB
MD5c68e2fbcf0d6aa032d875eda9d5064f1
SHA12a21c0df2831bf8b91c40031f9357afca0adfc72
SHA256aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
SHA512c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073
-
Filesize
900KB
MD5c68e2fbcf0d6aa032d875eda9d5064f1
SHA12a21c0df2831bf8b91c40031f9357afca0adfc72
SHA256aee41e3294113fd8de0408c5b4fe8e3091360ed7dfe330de01f354cf9312fece
SHA512c1299d8f7c8893dffd7012f13dd3f03d6ede311c3029514f4d5c3b6257809642e0b5ae1ac0dcc8f6ae4fde4ec9000129e3ab69ad8d0d2760baed3abc3e088073