Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
572b30c75a8e85b87ec00e12f93f743a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
572b30c75a8e85b87ec00e12f93f743a.exe
Resource
win10v2004-20220812-en
General
-
Target
572b30c75a8e85b87ec00e12f93f743a.exe
-
Size
490KB
-
MD5
572b30c75a8e85b87ec00e12f93f743a
-
SHA1
d32a1e3e696b61d8fa03f3201066782c8f7b16ed
-
SHA256
f826131b5c356693f53746f0af896eaac4217ef48a1e148759541c21fe29b07d
-
SHA512
dcd136679267c22aab305d36a18f8f74431e2617121f73af0a6d7d9b17ada7f700929a236782f3e19c5aea30475e7107af17ff9c0026576d7b9867cb6426448c
-
SSDEEP
6144:GYa6EUS6Eui96sY8Z2a0oHE13N/0Xo9bMJcSd5BC9O54V59qPr2FkEe9SSeG:GYIuzsY8iowmXjJhoOqLqPN0SL
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 3436 pmhjos.exe 4240 pmhjos.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pmhjos.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pmhjos.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pmhjos.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 api.ipify.org 8 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3436 set thread context of 4240 3436 pmhjos.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4240 pmhjos.exe 4240 pmhjos.exe 4240 pmhjos.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3436 pmhjos.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4240 pmhjos.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4240 pmhjos.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3436 2220 572b30c75a8e85b87ec00e12f93f743a.exe 80 PID 2220 wrote to memory of 3436 2220 572b30c75a8e85b87ec00e12f93f743a.exe 80 PID 2220 wrote to memory of 3436 2220 572b30c75a8e85b87ec00e12f93f743a.exe 80 PID 3436 wrote to memory of 4240 3436 pmhjos.exe 82 PID 3436 wrote to memory of 4240 3436 pmhjos.exe 82 PID 3436 wrote to memory of 4240 3436 pmhjos.exe 82 PID 3436 wrote to memory of 4240 3436 pmhjos.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pmhjos.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 pmhjos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572b30c75a8e85b87ec00e12f93f743a.exe"C:\Users\Admin\AppData\Local\Temp\572b30c75a8e85b87ec00e12f93f743a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\pmhjos.exe"C:\Users\Admin\AppData\Local\Temp\pmhjos.exe" C:\Users\Admin\AppData\Local\Temp\rcltcrysh.g2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\pmhjos.exe"C:\Users\Admin\AppData\Local\Temp\pmhjos.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4240
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD550b9934c3f63f92b356d23f48e4623e7
SHA118f2c9d07c37b866df2914783030805f446db081
SHA2564d63d890e45cc3785db36d9686233e018ed464b72cc47a1201847a8fa7aeb31b
SHA51290343768bf2c7c8ccd955d397825b19732e34bc62860ff4be738fbc10e01009c06e55d3a59708a85a93a3b7ef82964f878cc7e74318b19cb540f6e9ecf5a32e1
-
Filesize
84KB
MD550b9934c3f63f92b356d23f48e4623e7
SHA118f2c9d07c37b866df2914783030805f446db081
SHA2564d63d890e45cc3785db36d9686233e018ed464b72cc47a1201847a8fa7aeb31b
SHA51290343768bf2c7c8ccd955d397825b19732e34bc62860ff4be738fbc10e01009c06e55d3a59708a85a93a3b7ef82964f878cc7e74318b19cb540f6e9ecf5a32e1
-
Filesize
84KB
MD550b9934c3f63f92b356d23f48e4623e7
SHA118f2c9d07c37b866df2914783030805f446db081
SHA2564d63d890e45cc3785db36d9686233e018ed464b72cc47a1201847a8fa7aeb31b
SHA51290343768bf2c7c8ccd955d397825b19732e34bc62860ff4be738fbc10e01009c06e55d3a59708a85a93a3b7ef82964f878cc7e74318b19cb540f6e9ecf5a32e1
-
Filesize
5KB
MD54853e4b32d196c26a7b35fdf57aabf97
SHA11fe4bd429148c48ba34002b0194888800213f33f
SHA2567216ed48e98f6371645350d0e06259117147f369ab682f9c0e15a5a35aef419c
SHA512ad43ca6b5a25e7bb4c7a9046981f6beb7897de56189a63d08ab331fe455aa4d880a895ffc45635fba9b72db71c466db95710268a34458c2cbd7d17422b5d8d1a
-
Filesize
294KB
MD59ef9740b6964725362649fd052f7c6ff
SHA16c7089b1b1b6a90939435d1cfa7a9b0c9fd0623c
SHA256c876a19d9610f5a1d21cefa00e8044c57fe69d41062fb98c10af71a555a99da5
SHA5124ff4a5e103436c8aca301b27d1e7a550611fc8baac6f548608ab21297a171d929d0d051aa1d8c9f575608cf0c6651403753f5e1258f073a8b8fa82df7514b13f