Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07-12-2022 07:59
Static task
static1
Behavioral task
behavioral1
Sample
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe
Resource
win10-20220812-en
General
-
Target
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe
-
Size
9KB
-
MD5
b1171241b48005c847a23c77234243a5
-
SHA1
085a49fae5242224dd1db5e0d07f685717d4e734
-
SHA256
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817
-
SHA512
473d833c9c2d5462a3cd18e84568e0c38de1d19fde0d6641fce311aca12fc704251a246f538846209106be3af99663b6886d7fba5f80535413d232057cfe0f76
-
SSDEEP
96:mfYbmOfZ3fwbo7yA1pwF3Nhu5Ip04dLy6s0D7ekYzP/zzgRVMQkGgizNt:7aOJ1fwjvp0ALySukYzHPgRVMBlE
Malware Config
Extracted
agenttesla
http://cletonmy.com/apos/inc/b0c5a8117cbdaa.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-296-0x0000000000402EF0-mapping.dmp family_smokeloader behavioral1/memory/2220-327-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/2220-328-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 2 IoCs
Processes:
14EA.exe14EA.exepid process 3156 14EA.exe 1828 14EA.exe -
Deletes itself 1 IoCs
Processes:
pid process 3012 -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
14EA.exeexplorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 14EA.exe Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 14EA.exe Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 14EA.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe14EA.exe14EA.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xcpjcf = "\"C:\\Users\\Admin\\AppData\\Roaming\\Vdbvsfvgai\\Xcpjcf.exe\"" 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ysrekpbk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Qarfaanih\\Ysrekpbk.exe\"" 14EA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\nEzENMc = "C:\\Users\\Admin\\AppData\\Roaming\\nEzENMc\\nEzENMc.exe" 14EA.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 api.ipify.org 13 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe14EA.exedescription pid process target process PID 1684 set thread context of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 3156 set thread context of 1828 3156 14EA.exe 14EA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exepid process 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 2220 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 2220 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3012 -
Suspicious behavior: MapViewOfSection 13 IoCs
Processes:
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exepid process 2220 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exepowershell.exe14EA.exepowershell.exe14EA.exedescription pid process Token: SeDebugPrivilege 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 3156 14EA.exe Token: SeDebugPrivilege 4904 powershell.exe Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeDebugPrivilege 1828 14EA.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
14EA.exepid process 1828 14EA.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe14EA.exedescription pid process target process PID 1684 wrote to memory of 3604 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe powershell.exe PID 1684 wrote to memory of 3604 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe powershell.exe PID 1684 wrote to memory of 3604 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe powershell.exe PID 1684 wrote to memory of 4956 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 4956 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 4956 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 1684 wrote to memory of 2220 1684 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe 417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe PID 3012 wrote to memory of 3156 3012 14EA.exe PID 3012 wrote to memory of 3156 3012 14EA.exe PID 3012 wrote to memory of 3156 3012 14EA.exe PID 3012 wrote to memory of 4752 3012 explorer.exe PID 3012 wrote to memory of 4752 3012 explorer.exe PID 3012 wrote to memory of 4752 3012 explorer.exe PID 3012 wrote to memory of 4752 3012 explorer.exe PID 3012 wrote to memory of 4768 3012 explorer.exe PID 3012 wrote to memory of 4768 3012 explorer.exe PID 3012 wrote to memory of 4768 3012 explorer.exe PID 3012 wrote to memory of 2296 3012 explorer.exe PID 3012 wrote to memory of 2296 3012 explorer.exe PID 3012 wrote to memory of 2296 3012 explorer.exe PID 3012 wrote to memory of 2296 3012 explorer.exe PID 3012 wrote to memory of 1160 3012 explorer.exe PID 3012 wrote to memory of 1160 3012 explorer.exe PID 3012 wrote to memory of 1160 3012 explorer.exe PID 3012 wrote to memory of 2512 3012 explorer.exe PID 3012 wrote to memory of 2512 3012 explorer.exe PID 3012 wrote to memory of 2512 3012 explorer.exe PID 3012 wrote to memory of 2512 3012 explorer.exe PID 3156 wrote to memory of 4904 3156 14EA.exe powershell.exe PID 3156 wrote to memory of 4904 3156 14EA.exe powershell.exe PID 3156 wrote to memory of 4904 3156 14EA.exe powershell.exe PID 3012 wrote to memory of 5104 3012 explorer.exe PID 3012 wrote to memory of 5104 3012 explorer.exe PID 3012 wrote to memory of 5104 3012 explorer.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe PID 3156 wrote to memory of 1828 3156 14EA.exe 14EA.exe -
outlook_office_path 1 IoCs
Processes:
14EA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 14EA.exe -
outlook_win_path 1 IoCs
Processes:
14EA.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 14EA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe"C:\Users\Admin\AppData\Local\Temp\417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exeC:\Users\Admin\AppData\Local\Temp\417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe2⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exeC:\Users\Admin\AppData\Local\Temp\417598c79d3ab03c3e7dda9d7c3278db43dc2af7a8823016d6c737a716005817.exe2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\14EA.exeC:\Users\Admin\AppData\Local\Temp\14EA.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\14EA.exeC:\Users\Admin\AppData\Local\Temp\14EA.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1828
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
PID:4752
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4768
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2296
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1160
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2512
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD579538689a5dcf4543f1691c69c06da4e
SHA14169d2c4d2df0038b9d54a2e4b30d19274eeaeea
SHA256847e0dedbaf7189d594ef82389be5870bd67430f1728382e6f9e95a7c4b1c447
SHA5124bb350852f2515ff6edbe134cc6434b886a8f8fd9123698c2470e9f29892fb1f044c7750e6b62f434253ea171fcd6d952adb8a90b193536f8c9f14d7aac53544
-
Filesize
1KB
MD5b42b8394f52b01b93879625688c3d79d
SHA13ed5877ab13e7655482c19e8b7511f8b2bfcdbb3
SHA256b7b0a0ab5e777b74a8d7ec285804091eb3a4c71fcc2c57cddfa8541d05409cdd
SHA51286357e54c29ee9c107b5655d457121f35117565fae4fdd018e56079eb7ca012e4afe0a5d5562bc2996b932b02450ad0fbb7f27047315b524138a0fe08c4f79c2
-
Filesize
45KB
MD55f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
Filesize
16KB
MD5c8802c6de1c4dc7178db3895528f9dd9
SHA17e3637106d40843d50f8e6de6a1b15f517269578
SHA25651cf03133e58e6bd34bf5874e085b3a72fc4100390d1d09d73196821c5d9d59e
SHA512f1ba0c914c9b47c65d43a6a6aae937c3848d54e690d77098031244fabd3cac59b5fd1409262fad9a653e93a286ec3ad579dfff3356f004de1b1daa3ede4d7451
-
Filesize
9KB
MD5ef66e0de6a44f5547430c3df69e491c2
SHA11e1cf2ec6bfd92a63bfb5f1557c72b512037a982
SHA2567c3aaf2ed274a7e83529eb5f297d0fe6e8d9891d473d649cc200584a776a2e02
SHA51268ede92909f92d828c279c4a2693906a553087c03a6ccb01b27e15b755f862d74637da27a9b87222fe7c5a1577e316408d4513cfff5191c1a47c614cf4823554
-
Filesize
9KB
MD5ef66e0de6a44f5547430c3df69e491c2
SHA11e1cf2ec6bfd92a63bfb5f1557c72b512037a982
SHA2567c3aaf2ed274a7e83529eb5f297d0fe6e8d9891d473d649cc200584a776a2e02
SHA51268ede92909f92d828c279c4a2693906a553087c03a6ccb01b27e15b755f862d74637da27a9b87222fe7c5a1577e316408d4513cfff5191c1a47c614cf4823554
-
Filesize
9KB
MD5ef66e0de6a44f5547430c3df69e491c2
SHA11e1cf2ec6bfd92a63bfb5f1557c72b512037a982
SHA2567c3aaf2ed274a7e83529eb5f297d0fe6e8d9891d473d649cc200584a776a2e02
SHA51268ede92909f92d828c279c4a2693906a553087c03a6ccb01b27e15b755f862d74637da27a9b87222fe7c5a1577e316408d4513cfff5191c1a47c614cf4823554