Analysis
-
max time kernel
46s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-01-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
5f29ac3545ac089cee4cb9052f68862c273119a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f29ac3545ac089cee4cb9052f68862c273119a8.exe
Resource
win10v2004-20220812-en
General
-
Target
5f29ac3545ac089cee4cb9052f68862c273119a8.exe
-
Size
483KB
-
MD5
40754f9261d344e7ddef26387e0d13c2
-
SHA1
5f29ac3545ac089cee4cb9052f68862c273119a8
-
SHA256
14e7c7441ca7103c7cc9e96721342a7e60716c836f26a85037efdf6c7feae849
-
SHA512
a675a3f4a9fce9551d369cdfb4c2590990ae976143ae010318571f9b2793f1b1bb3fe7c627e57dab67eed6f2bef919440c49cb62d8591cc02b847ea160b8eaf5
-
SSDEEP
6144:2Ya630iY2KckCLgfKrUP1goSHMlR+zNDcbXoP04zf3KO:2Y2L2/ZwPJoCkhgjN4D
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2012 brkjgzwdzj.exe 1268 brkjgzwdzj.exe -
Loads dropped DLL 3 IoCs
pid Process 1652 5f29ac3545ac089cee4cb9052f68862c273119a8.exe 1652 5f29ac3545ac089cee4cb9052f68862c273119a8.exe 2012 brkjgzwdzj.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 brkjgzwdzj.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 brkjgzwdzj.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 brkjgzwdzj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 1268 2012 brkjgzwdzj.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1268 brkjgzwdzj.exe 1268 brkjgzwdzj.exe 1268 brkjgzwdzj.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2012 brkjgzwdzj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1268 brkjgzwdzj.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2012 1652 5f29ac3545ac089cee4cb9052f68862c273119a8.exe 26 PID 1652 wrote to memory of 2012 1652 5f29ac3545ac089cee4cb9052f68862c273119a8.exe 26 PID 1652 wrote to memory of 2012 1652 5f29ac3545ac089cee4cb9052f68862c273119a8.exe 26 PID 1652 wrote to memory of 2012 1652 5f29ac3545ac089cee4cb9052f68862c273119a8.exe 26 PID 2012 wrote to memory of 1268 2012 brkjgzwdzj.exe 27 PID 2012 wrote to memory of 1268 2012 brkjgzwdzj.exe 27 PID 2012 wrote to memory of 1268 2012 brkjgzwdzj.exe 27 PID 2012 wrote to memory of 1268 2012 brkjgzwdzj.exe 27 PID 2012 wrote to memory of 1268 2012 brkjgzwdzj.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 brkjgzwdzj.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 brkjgzwdzj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f29ac3545ac089cee4cb9052f68862c273119a8.exe"C:\Users\Admin\AppData\Local\Temp\5f29ac3545ac089cee4cb9052f68862c273119a8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe"C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe" C:\Users\Admin\AppData\Local\Temp\ybgntokhtc.e2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe"C:\Users\Admin\AppData\Local\Temp\brkjgzwdzj.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5bba67cd0ee6868f61d198f642cc78f32
SHA1211032116903b9794f43fa3b3be7f2efc8b6cfe5
SHA25652f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054
SHA512ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca
-
Filesize
52KB
MD5bba67cd0ee6868f61d198f642cc78f32
SHA1211032116903b9794f43fa3b3be7f2efc8b6cfe5
SHA25652f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054
SHA512ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca
-
Filesize
52KB
MD5bba67cd0ee6868f61d198f642cc78f32
SHA1211032116903b9794f43fa3b3be7f2efc8b6cfe5
SHA25652f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054
SHA512ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca
-
Filesize
315KB
MD5ade089553f3615697835151c7b8404e6
SHA16d0ee5d7ceea51c318216948214595af909027f3
SHA256582841784f46bdd8631a160a21470544c4a3ae1471700072440e0394adcb770c
SHA512c04b18a34d3e7233a79d86ce8b37d5feaba9fdfc6abe599ae3c3e30e8a65dba602b228e2104dd41b1bd5fbb8dbcad8acbbb6c8f3e9b04f60c4664d2de5926b63
-
Filesize
5KB
MD54100ab86afc6b1a4f6f10f5d9a691a02
SHA19a2e4ca006314b6325facc98c0f27e49bc9f0d49
SHA25623ae1eabbc79e9fbee6b8047038fdd86dcac9707db18e769a0fe53bed1d1a105
SHA5126b2ef6a1e28bc1477fd6b78e34509e5e96942b526dc184389516d76c54235bc92329dafee9459b8198b70b151aed07b21208918464b8697f79786e0bb28e84e5
-
Filesize
52KB
MD5bba67cd0ee6868f61d198f642cc78f32
SHA1211032116903b9794f43fa3b3be7f2efc8b6cfe5
SHA25652f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054
SHA512ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca
-
Filesize
52KB
MD5bba67cd0ee6868f61d198f642cc78f32
SHA1211032116903b9794f43fa3b3be7f2efc8b6cfe5
SHA25652f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054
SHA512ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca
-
Filesize
52KB
MD5bba67cd0ee6868f61d198f642cc78f32
SHA1211032116903b9794f43fa3b3be7f2efc8b6cfe5
SHA25652f3765c53ca641f1188b800f5df661eaab124f78950fe7e8f5858c765dfc054
SHA512ead9ac736abb41d0a7193059effd85704239e89250d671da7e4aada069de3fc72f9768b2eaf2ea45df1c689e0f0f24fb4ed614c1501e32921e40cefeba08e6ca