Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-01-2023 07:04
Static task
static1
Behavioral task
behavioral1
Sample
0faf2b13bf2287d0c8191f879abc20374497d891.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0faf2b13bf2287d0c8191f879abc20374497d891.exe
Resource
win10v2004-20221111-en
General
-
Target
0faf2b13bf2287d0c8191f879abc20374497d891.exe
-
Size
703KB
-
MD5
f34a371fbc755d99e600c88580b1a125
-
SHA1
0faf2b13bf2287d0c8191f879abc20374497d891
-
SHA256
874f3c445ed43153d3b4961a98ccba831952fa444403f3abda19e393b9b35ebb
-
SHA512
053679d5a51202003b3ce1bc9a4c222462741bdb65f2d5703960b61da9e429cdbc58b25933ad7b000b3cf0022a93e348d813eae20c9ae05e55547c318f54bc4f
-
SSDEEP
12288:4YVbEb1Sh4PQs27x4ry81mUM5zlbv2kuRaAscBJGG1wa:4YVbuA+PQjxkxy5hbvzuRaARBf13
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.sseximclearing.com - Port:
587 - Username:
[email protected] - Password:
Ssxm@9854 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 1668 whatsiff.exe 1304 whatsiff.exe -
Loads dropped DLL 3 IoCs
pid Process 1392 0faf2b13bf2287d0c8191f879abc20374497d891.exe 1392 0faf2b13bf2287d0c8191f879abc20374497d891.exe 1668 whatsiff.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whatsiff.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whatsiff.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whatsiff.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 1304 1668 whatsiff.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1304 whatsiff.exe 1304 whatsiff.exe 1304 whatsiff.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1668 whatsiff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1304 whatsiff.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1668 1392 0faf2b13bf2287d0c8191f879abc20374497d891.exe 27 PID 1392 wrote to memory of 1668 1392 0faf2b13bf2287d0c8191f879abc20374497d891.exe 27 PID 1392 wrote to memory of 1668 1392 0faf2b13bf2287d0c8191f879abc20374497d891.exe 27 PID 1392 wrote to memory of 1668 1392 0faf2b13bf2287d0c8191f879abc20374497d891.exe 27 PID 1668 wrote to memory of 1304 1668 whatsiff.exe 28 PID 1668 wrote to memory of 1304 1668 whatsiff.exe 28 PID 1668 wrote to memory of 1304 1668 whatsiff.exe 28 PID 1668 wrote to memory of 1304 1668 whatsiff.exe 28 PID 1668 wrote to memory of 1304 1668 whatsiff.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whatsiff.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 whatsiff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0faf2b13bf2287d0c8191f879abc20374497d891.exe"C:\Users\Admin\AppData\Local\Temp\0faf2b13bf2287d0c8191f879abc20374497d891.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\whatsiff.exe"C:\Users\Admin\AppData\Local\Temp\whatsiff.exe" C:\Users\Admin\AppData\Local\Temp\lkavjgly.j2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\whatsiff.exe"C:\Users\Admin\AppData\Local\Temp\whatsiff.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56f9bde37ab94b43a540f1b7c9d2a2b10
SHA1b82c973fff484497669f51fd0972ecfa3b1df2b4
SHA256196d6c021e0cbf8e70ba6d6373afc8ffd63570ebc604920bf5b80f5e78f97277
SHA512d4adb391b84bd3cdc0be645cbc1faa3a0ccf30c09e5bea1bae37021b1264c5d642f1794f61fa0ae8123ff8cd4945ce642b9db54910a8ec15f5f67ef5d4f65288
-
Filesize
61KB
MD5f151f49e53125b7508c1161a9ef06d74
SHA1ed148f98388d939caf89c745d5d7785b836548c7
SHA256b97309111c255764012ac1d42db2f031f8289ae632fb8687a3c50798bb3a9ec6
SHA5121179743879c43babdea5742420ef7d1bc68fee555456408d2ffb029801e306aaee07571bd53a41a6d1a664ca388c75a56e592cc701fe8d98ece9caeb620ced1d
-
Filesize
61KB
MD5f151f49e53125b7508c1161a9ef06d74
SHA1ed148f98388d939caf89c745d5d7785b836548c7
SHA256b97309111c255764012ac1d42db2f031f8289ae632fb8687a3c50798bb3a9ec6
SHA5121179743879c43babdea5742420ef7d1bc68fee555456408d2ffb029801e306aaee07571bd53a41a6d1a664ca388c75a56e592cc701fe8d98ece9caeb620ced1d
-
Filesize
61KB
MD5f151f49e53125b7508c1161a9ef06d74
SHA1ed148f98388d939caf89c745d5d7785b836548c7
SHA256b97309111c255764012ac1d42db2f031f8289ae632fb8687a3c50798bb3a9ec6
SHA5121179743879c43babdea5742420ef7d1bc68fee555456408d2ffb029801e306aaee07571bd53a41a6d1a664ca388c75a56e592cc701fe8d98ece9caeb620ced1d
-
Filesize
257KB
MD532c50a963a37e3d3d8247c916bd5838e
SHA14a02af8746961706ab2b82c9d2e44e5988d51d8e
SHA256ff183e66a9095121cea2acc408d1963b1d3541fb576da80a6dbe61029b8c70e7
SHA51217a8c977fb3b73c311e7491ec9b2e027723c3fee2e00335519b6ac1c71d9947defe48c3414c9052c2a6d27099fcecd3d7ef812f4ad9ae5d49c5aec74487ad2df
-
Filesize
61KB
MD5f151f49e53125b7508c1161a9ef06d74
SHA1ed148f98388d939caf89c745d5d7785b836548c7
SHA256b97309111c255764012ac1d42db2f031f8289ae632fb8687a3c50798bb3a9ec6
SHA5121179743879c43babdea5742420ef7d1bc68fee555456408d2ffb029801e306aaee07571bd53a41a6d1a664ca388c75a56e592cc701fe8d98ece9caeb620ced1d
-
Filesize
61KB
MD5f151f49e53125b7508c1161a9ef06d74
SHA1ed148f98388d939caf89c745d5d7785b836548c7
SHA256b97309111c255764012ac1d42db2f031f8289ae632fb8687a3c50798bb3a9ec6
SHA5121179743879c43babdea5742420ef7d1bc68fee555456408d2ffb029801e306aaee07571bd53a41a6d1a664ca388c75a56e592cc701fe8d98ece9caeb620ced1d
-
Filesize
61KB
MD5f151f49e53125b7508c1161a9ef06d74
SHA1ed148f98388d939caf89c745d5d7785b836548c7
SHA256b97309111c255764012ac1d42db2f031f8289ae632fb8687a3c50798bb3a9ec6
SHA5121179743879c43babdea5742420ef7d1bc68fee555456408d2ffb029801e306aaee07571bd53a41a6d1a664ca388c75a56e592cc701fe8d98ece9caeb620ced1d