Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 20:05
Static task
static1
Behavioral task
behavioral1
Sample
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
Resource
win10v2004-20220812-en
General
-
Target
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe
-
Size
358KB
-
MD5
7db0bc0c978bda0048ac2944b9b86245
-
SHA1
66e87764ff09ebba04681cbc2c61a43cbfa595b5
-
SHA256
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063
-
SHA512
a52b5044c908af4c404a5c4f3cf5764aac02f8af08bf7985f209a892a7e7e0e110e64201eadb8fb32b1594cb68cd88071911cb44cf2ae44ffa1b6bfea6fc8efb
-
SSDEEP
6144:LBnb2BEjQdYiIlpaaKRcMoBO5t9Dm/LhGTVwuIWqJllrmuDW5P/G2rb:FLbpxKuM5PqhGTZsJllmua5XG2rb
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
Processes:
flogjpnc.exeflogjpnc.exepid process 4156 flogjpnc.exe 5104 flogjpnc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
flogjpnc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 flogjpnc.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 flogjpnc.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 flogjpnc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
flogjpnc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\Skype\\Skype.exe" flogjpnc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
flogjpnc.exedescription pid process target process PID 4156 set thread context of 5104 4156 flogjpnc.exe flogjpnc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
flogjpnc.exepid process 5104 flogjpnc.exe 5104 flogjpnc.exe 5104 flogjpnc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
flogjpnc.exepid process 4156 flogjpnc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
flogjpnc.exedescription pid process Token: SeDebugPrivilege 5104 flogjpnc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
flogjpnc.exepid process 5104 flogjpnc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exeflogjpnc.exedescription pid process target process PID 4816 wrote to memory of 4156 4816 2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe flogjpnc.exe PID 4816 wrote to memory of 4156 4816 2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe flogjpnc.exe PID 4816 wrote to memory of 4156 4816 2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe flogjpnc.exe PID 4156 wrote to memory of 5104 4156 flogjpnc.exe flogjpnc.exe PID 4156 wrote to memory of 5104 4156 flogjpnc.exe flogjpnc.exe PID 4156 wrote to memory of 5104 4156 flogjpnc.exe flogjpnc.exe PID 4156 wrote to memory of 5104 4156 flogjpnc.exe flogjpnc.exe -
outlook_office_path 1 IoCs
Processes:
flogjpnc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 flogjpnc.exe -
outlook_win_path 1 IoCs
Processes:
flogjpnc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 flogjpnc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe"C:\Users\Admin\AppData\Local\Temp\2d5d72d557920e6beef5c35e3cdd3ddd1339b2c4306e4b79e540058afede2063.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe"C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe" C:\Users\Admin\AppData\Local\Temp\jezmemc.dh2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe"C:\Users\Admin\AppData\Local\Temp\flogjpnc.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:5104
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD56376674d9cb734641768158e12de22ac
SHA14c53bc87384e851f20d69f966dd78473831acb5f
SHA25685a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59
SHA51242f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0
-
Filesize
267KB
MD56376674d9cb734641768158e12de22ac
SHA14c53bc87384e851f20d69f966dd78473831acb5f
SHA25685a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59
SHA51242f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0
-
Filesize
267KB
MD56376674d9cb734641768158e12de22ac
SHA14c53bc87384e851f20d69f966dd78473831acb5f
SHA25685a2cd0739a8386f33c0e76360908f5c32111991e705a68a914551eaf1b4eb59
SHA51242f2b0625e33a849588c656c21e04e22a07a04e85509aa389b711f60f8e90a8feb6759b046efd2842386765899c3e20561d10aea024294e5e0522676f1b308a0
-
Filesize
5KB
MD53db488222c4269cd86ce00231240a46d
SHA12c75455dd19e6773adc23d8f341a268a33dfa7f5
SHA256a4efc05c8ebc47650c3be4d99f748217ec5ecc8039323c2b7634bbdf69bf2157
SHA5125078bba8f217fd18bc86b8451b96762e463881d738219cf5cef67584fefb71722230d554b09ab4c76cdfc5376d2c34257b457c060b038dec3d0438cb4ed06e6a
-
Filesize
241KB
MD55378624f251a39f83153afa9b648260e
SHA128f23387839063f3b870698f74671c817db79f65
SHA256b4f1a9ed091fc4731f07784e655219e64a654e772876a2625796150da1cf9faf
SHA512c6beded1813692862409a3d156bdd50865a26367ac439b362e081a3eb0419f22bdd3e2e00da209d0257cc22f85feca076e3ec80658d41bbc0f51ec64f644b5c9