Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2023, 10:03

General

  • Target

    572b30c75a8e85b87ec00e12f93f743a.exe

  • Size

    490KB

  • MD5

    572b30c75a8e85b87ec00e12f93f743a

  • SHA1

    d32a1e3e696b61d8fa03f3201066782c8f7b16ed

  • SHA256

    f826131b5c356693f53746f0af896eaac4217ef48a1e148759541c21fe29b07d

  • SHA512

    dcd136679267c22aab305d36a18f8f74431e2617121f73af0a6d7d9b17ada7f700929a236782f3e19c5aea30475e7107af17ff9c0026576d7b9867cb6426448c

  • SSDEEP

    6144:GYa6EUS6Eui96sY8Z2a0oHE13N/0Xo9bMJcSd5BC9O54V59qPr2FkEe9SSeG:GYIuzsY8iowmXjJhoOqLqPN0SL

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\572b30c75a8e85b87ec00e12f93f743a.exe
    "C:\Users\Admin\AppData\Local\Temp\572b30c75a8e85b87ec00e12f93f743a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\pmhjos.exe
      "C:\Users\Admin\AppData\Local\Temp\pmhjos.exe" C:\Users\Admin\AppData\Local\Temp\rcltcrysh.g
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\pmhjos.exe
        "C:\Users\Admin\AppData\Local\Temp\pmhjos.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:4240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\pmhjos.exe

    Filesize

    84KB

    MD5

    50b9934c3f63f92b356d23f48e4623e7

    SHA1

    18f2c9d07c37b866df2914783030805f446db081

    SHA256

    4d63d890e45cc3785db36d9686233e018ed464b72cc47a1201847a8fa7aeb31b

    SHA512

    90343768bf2c7c8ccd955d397825b19732e34bc62860ff4be738fbc10e01009c06e55d3a59708a85a93a3b7ef82964f878cc7e74318b19cb540f6e9ecf5a32e1

  • C:\Users\Admin\AppData\Local\Temp\pmhjos.exe

    Filesize

    84KB

    MD5

    50b9934c3f63f92b356d23f48e4623e7

    SHA1

    18f2c9d07c37b866df2914783030805f446db081

    SHA256

    4d63d890e45cc3785db36d9686233e018ed464b72cc47a1201847a8fa7aeb31b

    SHA512

    90343768bf2c7c8ccd955d397825b19732e34bc62860ff4be738fbc10e01009c06e55d3a59708a85a93a3b7ef82964f878cc7e74318b19cb540f6e9ecf5a32e1

  • C:\Users\Admin\AppData\Local\Temp\pmhjos.exe

    Filesize

    84KB

    MD5

    50b9934c3f63f92b356d23f48e4623e7

    SHA1

    18f2c9d07c37b866df2914783030805f446db081

    SHA256

    4d63d890e45cc3785db36d9686233e018ed464b72cc47a1201847a8fa7aeb31b

    SHA512

    90343768bf2c7c8ccd955d397825b19732e34bc62860ff4be738fbc10e01009c06e55d3a59708a85a93a3b7ef82964f878cc7e74318b19cb540f6e9ecf5a32e1

  • C:\Users\Admin\AppData\Local\Temp\rcltcrysh.g

    Filesize

    5KB

    MD5

    4853e4b32d196c26a7b35fdf57aabf97

    SHA1

    1fe4bd429148c48ba34002b0194888800213f33f

    SHA256

    7216ed48e98f6371645350d0e06259117147f369ab682f9c0e15a5a35aef419c

    SHA512

    ad43ca6b5a25e7bb4c7a9046981f6beb7897de56189a63d08ab331fe455aa4d880a895ffc45635fba9b72db71c466db95710268a34458c2cbd7d17422b5d8d1a

  • C:\Users\Admin\AppData\Local\Temp\wuncafbtk.t

    Filesize

    294KB

    MD5

    9ef9740b6964725362649fd052f7c6ff

    SHA1

    6c7089b1b1b6a90939435d1cfa7a9b0c9fd0623c

    SHA256

    c876a19d9610f5a1d21cefa00e8044c57fe69d41062fb98c10af71a555a99da5

    SHA512

    4ff4a5e103436c8aca301b27d1e7a550611fc8baac6f548608ab21297a171d929d0d051aa1d8c9f575608cf0c6651403753f5e1258f073a8b8fa82df7514b13f

  • memory/4240-139-0x0000000004990000-0x0000000004F34000-memory.dmp

    Filesize

    5.6MB

  • memory/4240-140-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/4240-141-0x0000000004FB0000-0x000000000504C000-memory.dmp

    Filesize

    624KB

  • memory/4240-142-0x0000000005710000-0x0000000005776000-memory.dmp

    Filesize

    408KB

  • memory/4240-143-0x00000000062C0000-0x0000000006352000-memory.dmp

    Filesize

    584KB

  • memory/4240-144-0x0000000006540000-0x0000000006590000-memory.dmp

    Filesize

    320KB

  • memory/4240-145-0x0000000006650000-0x000000000665A000-memory.dmp

    Filesize

    40KB