Analysis

  • max time kernel
    91s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2023 01:10

General

  • Target

    5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d.exe

  • Size

    343KB

  • MD5

    383a66b236ca130567b944ded28acbb3

  • SHA1

    1f32c099f88de3de17411232b469720de80b9568

  • SHA256

    5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d

  • SHA512

    12aa8017a36beef09fd08da0c5175c311dff38f25edd7a6a79e5ed5179cf75a8ee237c62b229e9ae74b8c004d7b1f401db952844e4feed7c39b3be5ff55eac23

  • SSDEEP

    6144:gYa6Ydr4i+dYQy+/quTtshVOl9jqNmB0x+4/iew7ePphpRdCVXsy:gYqGi+36uTamvKmeNPphnkFV

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d.exe
    "C:\Users\Admin\AppData\Local\Temp\5c33966947abe22733168a2405879c3260d8c01699ee0ad9462846f481d2ad8d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Users\Admin\AppData\Local\Temp\lhjlh.exe
      "C:\Users\Admin\AppData\Local\Temp\lhjlh.exe" C:\Users\Admin\AppData\Local\Temp\bpiaurtg.lxm
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Users\Admin\AppData\Local\Temp\lhjlh.exe
        "C:\Users\Admin\AppData\Local\Temp\lhjlh.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bpiaurtg.lxm
    Filesize

    5KB

    MD5

    e7c4dfe685330a359d7086353be044e3

    SHA1

    d77e89fb8fed3f8d393ab1626b0f04f51b102241

    SHA256

    7a09ad825dda413368597b65a70620d7b2c0b7f4bc4f50951e08ef944ec32e81

    SHA512

    470ed5b264137e582bfdadad8b2c7a11ca2179c556176146f3b35b6ff408afc2784a308e0b75132900ae72cabb30d8536842ea4f23d077f92ed282e6fe916526

  • C:\Users\Admin\AppData\Local\Temp\lhjlh.exe
    Filesize

    50KB

    MD5

    c20b75ad041c86940589f41878af7187

    SHA1

    2dfb0a1b7c680157c2ae7b7a60a6c4f83bfe7c2e

    SHA256

    c017f5bbfdec5544845a48d05c445c5f3744ed60b60fa6b40c703a6477b8a1f7

    SHA512

    df10c32fbedc23fa59a90d41afac6bc679c930a793d13897d6c8a786e5dd8f67b86d294c58c56eb4d72d86c74b497ebeb1fc5d0ef444fd2f83f03a484c1caff2

  • C:\Users\Admin\AppData\Local\Temp\lhjlh.exe
    Filesize

    50KB

    MD5

    c20b75ad041c86940589f41878af7187

    SHA1

    2dfb0a1b7c680157c2ae7b7a60a6c4f83bfe7c2e

    SHA256

    c017f5bbfdec5544845a48d05c445c5f3744ed60b60fa6b40c703a6477b8a1f7

    SHA512

    df10c32fbedc23fa59a90d41afac6bc679c930a793d13897d6c8a786e5dd8f67b86d294c58c56eb4d72d86c74b497ebeb1fc5d0ef444fd2f83f03a484c1caff2

  • C:\Users\Admin\AppData\Local\Temp\lhjlh.exe
    Filesize

    50KB

    MD5

    c20b75ad041c86940589f41878af7187

    SHA1

    2dfb0a1b7c680157c2ae7b7a60a6c4f83bfe7c2e

    SHA256

    c017f5bbfdec5544845a48d05c445c5f3744ed60b60fa6b40c703a6477b8a1f7

    SHA512

    df10c32fbedc23fa59a90d41afac6bc679c930a793d13897d6c8a786e5dd8f67b86d294c58c56eb4d72d86c74b497ebeb1fc5d0ef444fd2f83f03a484c1caff2

  • C:\Users\Admin\AppData\Local\Temp\pjxgwrq.d
    Filesize

    315KB

    MD5

    7d6278c457fc5f516e3648533a28dfe9

    SHA1

    ba68478cc1326b0958a4674e1d4dd0e7e5109dc8

    SHA256

    4d6fc082a341a6cf1809d577d35d452496e637e4e75346b7f1ff232b236eb47c

    SHA512

    a5b84ae497ef8f45e5dac2ea2e6f2adfd8f4d2e5e9d382d71bed74951ba64d6c0f07a1a28903304736489577b825c99b55b1af6dd624372a2e71388e4482e1e7

  • memory/360-137-0x0000000000000000-mapping.dmp
  • memory/360-139-0x0000000000400000-0x000000000044E000-memory.dmp
    Filesize

    312KB

  • memory/360-140-0x0000000004AC0000-0x0000000005064000-memory.dmp
    Filesize

    5.6MB

  • memory/360-141-0x0000000004A10000-0x0000000004AAC000-memory.dmp
    Filesize

    624KB

  • memory/360-142-0x00000000059E0000-0x0000000005A46000-memory.dmp
    Filesize

    408KB

  • memory/360-143-0x0000000005B70000-0x0000000005BC0000-memory.dmp
    Filesize

    320KB

  • memory/360-144-0x0000000005D20000-0x0000000005DB2000-memory.dmp
    Filesize

    584KB

  • memory/360-145-0x0000000005DE0000-0x0000000005DEA000-memory.dmp
    Filesize

    40KB

  • memory/972-132-0x0000000000000000-mapping.dmp