Analysis
-
max time kernel
156s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 19:28
Static task
static1
Behavioral task
behavioral1
Sample
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
Resource
win10v2004-20221111-en
General
-
Target
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
-
Size
556KB
-
MD5
b757c4ac5a46c4e9fc2cf9e924702804
-
SHA1
27caf0391db69d2b2543a0172747e62a9a6e208c
-
SHA256
6941a5420e23e7309cc09e6ffebf847a7c781dbbb726996a2b3d36340d347819
-
SHA512
79cb0c6d3e2ec59f230fb221937104bd9a6890276eb1c0a8283340359380610cc8f8b3c0875b1b0e360967d50f924a9a8b4be7a2f70165927d3278f660198b36
-
SSDEEP
12288:CYZ/txeoKFg+15c6qRUbTAg9sSBa04UtUFeJ9/TG+R:CYZ/HeoKC+1KnG9sSp4UtUcn/R
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 3 IoCs
pid Process 2348 phqhhj.exe 2840 phqhhj.exe 1000 phqhhj.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GsHLJkZ = "C:\\Users\\Admin\\AppData\\Roaming\\GsHLJkZ\\GsHLJkZ.exe" phqhhj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 1000 2348 phqhhj.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2348 phqhhj.exe 2348 phqhhj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1000 phqhhj.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2348 2844 27caf0391db69d2b2543a0172747e62a9a6e208c.exe 79 PID 2844 wrote to memory of 2348 2844 27caf0391db69d2b2543a0172747e62a9a6e208c.exe 79 PID 2844 wrote to memory of 2348 2844 27caf0391db69d2b2543a0172747e62a9a6e208c.exe 79 PID 2348 wrote to memory of 2840 2348 phqhhj.exe 80 PID 2348 wrote to memory of 2840 2348 phqhhj.exe 80 PID 2348 wrote to memory of 2840 2348 phqhhj.exe 80 PID 2348 wrote to memory of 1000 2348 phqhhj.exe 81 PID 2348 wrote to memory of 1000 2348 phqhhj.exe 81 PID 2348 wrote to memory of 1000 2348 phqhhj.exe 81 PID 2348 wrote to memory of 1000 2348 phqhhj.exe 81 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27caf0391db69d2b2543a0172747e62a9a6e208c.exe"C:\Users\Admin\AppData\Local\Temp\27caf0391db69d2b2543a0172747e62a9a6e208c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"C:\Users\Admin\AppData\Local\Temp\phqhhj.exe" C:\Users\Admin\AppData\Local\Temp\wlczo.xb2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"3⤵
- Executes dropped EXE
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1000
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
263KB
MD5703200c1820f0a7d090bb342573acffe
SHA1d14a86cf92a11faa2692c113ad34306332aeee1b
SHA256fabf628bb502705160b50886846b06951f50c19982d223664e518515f33ff78a
SHA512010be668ca02ec30018ba02a2d70ce30db88cfdea06cb06813e546faaa6bf0b7397c9b7440dd8a5844a0210eb97cd646020a2789905b144f88a85420dfdf091e
-
Filesize
5KB
MD5069493cf50c4a4d645746c5158b1ab9c
SHA11dddb79af31ea90ce6d1d044eb8c6da422a9b715
SHA25603101a83613201c1b3987f8b95aa1199246e7a7ec994de87fe988f891a1b6376
SHA5122351d70da060f7704ff6302a68ba40485d6db77f7bb51d547085d6496754c694125778d6a85f2f404b34f056fa6dbb1435d82d074e5fdcab29aba9440e526a70