Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2023 09:56
Static task
static1
Behavioral task
behavioral1
Sample
Fatura_SUN202200000166.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Fatura_SUN202200000166.exe
Resource
win10v2004-20220901-en
General
-
Target
Fatura_SUN202200000166.exe
-
Size
460KB
-
MD5
25b24cc692dbff9a944e08722cf67574
-
SHA1
dedce1680f802b0ddc708ab74eba5cd5f87e658f
-
SHA256
4dfcba72b64ae285fee5ba43764d81e4c436ce8df68730405c197b5ac69d3698
-
SHA512
64bc777c16e887e85cb4c8b263fa33589120d7ce77cb94e9c3ed1ad1242954ce3e4c04b544c28335f84ebe18f100d43ed99d59096415e315df303bb3ded255e3
-
SSDEEP
12288:iY5/tFGdaxnb/4zjXvj5uIG3GpAu8EY9I:iY5/rW6nb/4f/Fm2pVA9I
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2228 azwiudrxkn.exe 2840 azwiudrxkn.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 azwiudrxkn.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 azwiudrxkn.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 azwiudrxkn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lxixchy = "C:\\Users\\Admin\\AppData\\Roaming\\wjllukpsewxf\\hwtjp.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\azwiudrxkn.exe\" C:\\Users\\Admin\\AppData\\Lo" azwiudrxkn.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GsHLJkZ = "C:\\Users\\Admin\\AppData\\Roaming\\GsHLJkZ\\GsHLJkZ.exe" azwiudrxkn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 2840 2228 azwiudrxkn.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2840 azwiudrxkn.exe 2840 azwiudrxkn.exe 2840 azwiudrxkn.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2228 azwiudrxkn.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 azwiudrxkn.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3724 wrote to memory of 2228 3724 Fatura_SUN202200000166.exe 80 PID 3724 wrote to memory of 2228 3724 Fatura_SUN202200000166.exe 80 PID 3724 wrote to memory of 2228 3724 Fatura_SUN202200000166.exe 80 PID 2228 wrote to memory of 2840 2228 azwiudrxkn.exe 81 PID 2228 wrote to memory of 2840 2228 azwiudrxkn.exe 81 PID 2228 wrote to memory of 2840 2228 azwiudrxkn.exe 81 PID 2228 wrote to memory of 2840 2228 azwiudrxkn.exe 81 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 azwiudrxkn.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 azwiudrxkn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fatura_SUN202200000166.exe"C:\Users\Admin\AppData\Local\Temp\Fatura_SUN202200000166.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\azwiudrxkn.exe"C:\Users\Admin\AppData\Local\Temp\azwiudrxkn.exe" C:\Users\Admin\AppData\Local\Temp\mwynqzv.h2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\azwiudrxkn.exe"C:\Users\Admin\AppData\Local\Temp\azwiudrxkn.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD596970abeeedc0341ba36c8c3654d5a9b
SHA163f72352e5caade0b33822e8a1c4fbfce34223c3
SHA25674c63cc8b30d7fab467f2ed820605e5d357ef1ee7c978eb2ee32bab91b650229
SHA51203f451597158a5a774c63c871cc557cfe49f760b332de12c31c57ae2ccf32139f7a445bc661a68ab0b7530236993b414ba06e3f73d2fac0eba3acab8799708ce
-
Filesize
87KB
MD596970abeeedc0341ba36c8c3654d5a9b
SHA163f72352e5caade0b33822e8a1c4fbfce34223c3
SHA25674c63cc8b30d7fab467f2ed820605e5d357ef1ee7c978eb2ee32bab91b650229
SHA51203f451597158a5a774c63c871cc557cfe49f760b332de12c31c57ae2ccf32139f7a445bc661a68ab0b7530236993b414ba06e3f73d2fac0eba3acab8799708ce
-
Filesize
87KB
MD596970abeeedc0341ba36c8c3654d5a9b
SHA163f72352e5caade0b33822e8a1c4fbfce34223c3
SHA25674c63cc8b30d7fab467f2ed820605e5d357ef1ee7c978eb2ee32bab91b650229
SHA51203f451597158a5a774c63c871cc557cfe49f760b332de12c31c57ae2ccf32139f7a445bc661a68ab0b7530236993b414ba06e3f73d2fac0eba3acab8799708ce
-
Filesize
7KB
MD5586b18ca8b36dc077b6e5ed53735b109
SHA1200dceeaea799ac03d9bee96c6710f18b304f905
SHA256aeb74eaf6b0fe0c95278e7a51d84fb85a3cb976e7a379eabc984396ab1aa9ccf
SHA5120ae501b48cb41a73c271d0b22879eebf2839a27b7744e77de0d8d33262bd3835477475e9f9f9b7d5e12bdcf7a73eddbfcc95933c1d6fd18fe967d5ec716a4700
-
Filesize
259KB
MD59694626481ea262798c10bf9b5a86fd6
SHA1ccd481dde6f4e5157d98494d868ba48cb9bdf70e
SHA25626a96a2f78df5db5cd770d3df8776d8f689e2691ab858e18034d7decf86045e9
SHA5129eec2f1d93299276987c1337a27a9e9bcccfe1cd2a1ce7495acbcd975e603159f1d74f028105b2e4bbffd61c8e71c3e699b5bab843461416862e0169d20b5a5b