Analysis
-
max time kernel
170s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 19:18
Static task
static1
Behavioral task
behavioral1
Sample
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
Resource
win10v2004-20221111-en
General
-
Target
27caf0391db69d2b2543a0172747e62a9a6e208c.exe
-
Size
556KB
-
MD5
b757c4ac5a46c4e9fc2cf9e924702804
-
SHA1
27caf0391db69d2b2543a0172747e62a9a6e208c
-
SHA256
6941a5420e23e7309cc09e6ffebf847a7c781dbbb726996a2b3d36340d347819
-
SHA512
79cb0c6d3e2ec59f230fb221937104bd9a6890276eb1c0a8283340359380610cc8f8b3c0875b1b0e360967d50f924a9a8b4be7a2f70165927d3278f660198b36
-
SSDEEP
12288:CYZ/txeoKFg+15c6qRUbTAg9sSBa04UtUFeJ9/TG+R:CYZ/HeoKC+1KnG9sSp4UtUcn/R
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 4328 phqhhj.exe 232 phqhhj.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GsHLJkZ = "C:\\Users\\Admin\\AppData\\Roaming\\GsHLJkZ\\GsHLJkZ.exe" phqhhj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4328 set thread context of 232 4328 phqhhj.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4328 phqhhj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 232 phqhhj.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4328 4452 27caf0391db69d2b2543a0172747e62a9a6e208c.exe 79 PID 4452 wrote to memory of 4328 4452 27caf0391db69d2b2543a0172747e62a9a6e208c.exe 79 PID 4452 wrote to memory of 4328 4452 27caf0391db69d2b2543a0172747e62a9a6e208c.exe 79 PID 4328 wrote to memory of 232 4328 phqhhj.exe 80 PID 4328 wrote to memory of 232 4328 phqhhj.exe 80 PID 4328 wrote to memory of 232 4328 phqhhj.exe 80 PID 4328 wrote to memory of 232 4328 phqhhj.exe 80 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 phqhhj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27caf0391db69d2b2543a0172747e62a9a6e208c.exe"C:\Users\Admin\AppData\Local\Temp\27caf0391db69d2b2543a0172747e62a9a6e208c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"C:\Users\Admin\AppData\Local\Temp\phqhhj.exe" C:\Users\Admin\AppData\Local\Temp\wlczo.xb2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"C:\Users\Admin\AppData\Local\Temp\phqhhj.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:232
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
332KB
MD52944001abd5735df39e6962bc0c37497
SHA14473dc8fe890aa8bf117e00e6b5fcf433352c77f
SHA2560484b6558adaa6c638a4b9cc89bd485949b62f4988c29432f5b2326aa41a00b8
SHA512134f92107ebfba9b9379946af618fe96e36a412fd8d94cf7b23f9b808172296b91cb6714bae2cbb343d3898954b80b657951fa644897ffa6826ad07ba664b5d9
-
Filesize
263KB
MD5703200c1820f0a7d090bb342573acffe
SHA1d14a86cf92a11faa2692c113ad34306332aeee1b
SHA256fabf628bb502705160b50886846b06951f50c19982d223664e518515f33ff78a
SHA512010be668ca02ec30018ba02a2d70ce30db88cfdea06cb06813e546faaa6bf0b7397c9b7440dd8a5844a0210eb97cd646020a2789905b144f88a85420dfdf091e
-
Filesize
5KB
MD5069493cf50c4a4d645746c5158b1ab9c
SHA11dddb79af31ea90ce6d1d044eb8c6da422a9b715
SHA25603101a83613201c1b3987f8b95aa1199246e7a7ec994de87fe988f891a1b6376
SHA5122351d70da060f7704ff6302a68ba40485d6db77f7bb51d547085d6496754c694125778d6a85f2f404b34f056fa6dbb1435d82d074e5fdcab29aba9440e526a70