Analysis
-
max time kernel
91s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2023 18:47
Static task
static1
Behavioral task
behavioral1
Sample
8c0affc928dd817fa864a9211f11f89fd36701aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c0affc928dd817fa864a9211f11f89fd36701aa.exe
Resource
win10v2004-20220812-en
General
-
Target
8c0affc928dd817fa864a9211f11f89fd36701aa.exe
-
Size
571KB
-
MD5
95bfd4665a21e54e620676e1cef82fc2
-
SHA1
8c0affc928dd817fa864a9211f11f89fd36701aa
-
SHA256
915cb8994b02a7d735b230b000ee1d7797500c5c0846b24103a9ad63956cbb41
-
SHA512
7ec7c12d4369b61a282eec87be532923f8aa2b24e24a246834030610e1d143904e25c27f1328186a2100d157eb3104e7e5ef3e20aca8c75370fdb043153d7a19
-
SSDEEP
12288:gYziYVrBhcLnvtVsKECqKgYGT+mSziTPsJrnK4/im:gYziY9q3zcVYGTRaib0n1im
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 3060 ktuqfv.exe 2808 ktuqfv.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ktuqfv.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ktuqfv.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ktuqfv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3060 set thread context of 2808 3060 ktuqfv.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2808 ktuqfv.exe 2808 ktuqfv.exe 2808 ktuqfv.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3060 ktuqfv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 ktuqfv.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3060 2180 8c0affc928dd817fa864a9211f11f89fd36701aa.exe 80 PID 2180 wrote to memory of 3060 2180 8c0affc928dd817fa864a9211f11f89fd36701aa.exe 80 PID 2180 wrote to memory of 3060 2180 8c0affc928dd817fa864a9211f11f89fd36701aa.exe 80 PID 3060 wrote to memory of 2808 3060 ktuqfv.exe 81 PID 3060 wrote to memory of 2808 3060 ktuqfv.exe 81 PID 3060 wrote to memory of 2808 3060 ktuqfv.exe 81 PID 3060 wrote to memory of 2808 3060 ktuqfv.exe 81 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ktuqfv.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ktuqfv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c0affc928dd817fa864a9211f11f89fd36701aa.exe"C:\Users\Admin\AppData\Local\Temp\8c0affc928dd817fa864a9211f11f89fd36701aa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\ktuqfv.exe"C:\Users\Admin\AppData\Local\Temp\ktuqfv.exe" C:\Users\Admin\AppData\Local\Temp\ppsdtvlem.xob2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\ktuqfv.exe"C:\Users\Admin\AppData\Local\Temp\ktuqfv.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5020a5aa1ffbe44f97f3751bc8e9b2dcd
SHA11d5e2fac8571445ef89c4920e36e2fc11b2e0b3f
SHA2567b20dd5061bdb757e8efbbdd4a1ce549b1a76ebcebd9ae061fc06484873c10a2
SHA512bfcfb295a86e852384edf701547943ed83a28cd069965685919f3c65ce3ae7a10c7f93815c8fc3e9fbfac5aa49b562206e6f9bf79c469363a51e75b3898de2a4
-
Filesize
52KB
MD5020a5aa1ffbe44f97f3751bc8e9b2dcd
SHA11d5e2fac8571445ef89c4920e36e2fc11b2e0b3f
SHA2567b20dd5061bdb757e8efbbdd4a1ce549b1a76ebcebd9ae061fc06484873c10a2
SHA512bfcfb295a86e852384edf701547943ed83a28cd069965685919f3c65ce3ae7a10c7f93815c8fc3e9fbfac5aa49b562206e6f9bf79c469363a51e75b3898de2a4
-
Filesize
52KB
MD5020a5aa1ffbe44f97f3751bc8e9b2dcd
SHA11d5e2fac8571445ef89c4920e36e2fc11b2e0b3f
SHA2567b20dd5061bdb757e8efbbdd4a1ce549b1a76ebcebd9ae061fc06484873c10a2
SHA512bfcfb295a86e852384edf701547943ed83a28cd069965685919f3c65ce3ae7a10c7f93815c8fc3e9fbfac5aa49b562206e6f9bf79c469363a51e75b3898de2a4
-
Filesize
5KB
MD5be5c5aff821434ef05427f42d5795688
SHA114b550a6c69837d660b04a697511b333d88754c4
SHA256669aa058a22645ebb0e9d6f7313e6519415f7889971c067f4eb3da61621dacbf
SHA512a78ec795f26035aefc3946869c61365c9369253bed9e2823822a794467be86504b31de7727fdfd98996befc0fb77d94288ffb8c16dbe785bbd9ca2ceab14b510
-
Filesize
315KB
MD520273494baf235ea75bf04836980c092
SHA1112b31d4a15085857da00bfeb2e79649ae02e490
SHA256672f37e6a585df40b3cd37350f4e90119719de8f1ad34aece8cc93c2ef214c05
SHA512f6268fe0a1d17c918f2de934af516b0c7002c320b3e17e67434636c172a21bcadb42012ec26c806dea3f809c8dc7eb9ccb933518eaf16fa4e8b7a631e7ebc6ef