Analysis
-
max time kernel
83s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09/02/2023, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
BL-SHIPPING DOCUMENT.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
BL-SHIPPING DOCUMENT.exe
Resource
win10v2004-20220901-en
General
-
Target
BL-SHIPPING DOCUMENT.exe
-
Size
326KB
-
MD5
3c0c2e104b46a135df4599e96095bb54
-
SHA1
923a0fba131a13f55af57fd890b5dd9759ce8937
-
SHA256
53606fcd5a8f195a763cb48f5aafffac01fdfb8e73d5fe99438ebc2d1eba6eca
-
SHA512
810d55697c523b14d43ee3a06717eacd5ac9e79950aac2ef31b708fc97b73f7deb6b922b692e0d8056d64e3e5d4b8d2999e02aa96441521dbfd02673bcc8a1c1
-
SSDEEP
6144:vYa6qWM5HuCUhJtm9r1PKQC9X0dQ7n5dA2vAxwT1R+6cEytNgJaQzkTbW2v:vY0TtnJpPKZ75dVTxXsP73v
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 584 lxwqfwyb.exe 1180 lxwqfwyb.exe -
Loads dropped DLL 3 IoCs
pid Process 112 BL-SHIPPING DOCUMENT.exe 112 BL-SHIPPING DOCUMENT.exe 584 lxwqfwyb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lxwqfwyb.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lxwqfwyb.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lxwqfwyb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 584 set thread context of 1180 584 lxwqfwyb.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 584 lxwqfwyb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1180 lxwqfwyb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 112 wrote to memory of 584 112 BL-SHIPPING DOCUMENT.exe 28 PID 112 wrote to memory of 584 112 BL-SHIPPING DOCUMENT.exe 28 PID 112 wrote to memory of 584 112 BL-SHIPPING DOCUMENT.exe 28 PID 112 wrote to memory of 584 112 BL-SHIPPING DOCUMENT.exe 28 PID 584 wrote to memory of 1180 584 lxwqfwyb.exe 29 PID 584 wrote to memory of 1180 584 lxwqfwyb.exe 29 PID 584 wrote to memory of 1180 584 lxwqfwyb.exe 29 PID 584 wrote to memory of 1180 584 lxwqfwyb.exe 29 PID 584 wrote to memory of 1180 584 lxwqfwyb.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lxwqfwyb.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lxwqfwyb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BL-SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\BL-SHIPPING DOCUMENT.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe"C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe" C:\Users\Admin\AppData\Local\Temp\xdlerxqldy.qa2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe"C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD577dfa8df7c6082bded748f061eead865
SHA1ccc750063beb871a0d6f18ce9abddf78fb0d5398
SHA256c4d46af9758781da9e06933b23b37a2617e294d706c0b7f3032165e8efa47b8c
SHA51209cd522a2330cd0f93a56dbc14d53901ac50fc4accf8e6fccb9851e2d352f11650d72e125424726e71c7d02f43062d5f992533ed2c23cc882f28446b3d08106f
-
Filesize
122KB
MD5aa36a47283654c7ab1895506b8515a2d
SHA133807366499e16e74a113918c8c83ee8bb6691a1
SHA256e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3
SHA5124516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3
-
Filesize
122KB
MD5aa36a47283654c7ab1895506b8515a2d
SHA133807366499e16e74a113918c8c83ee8bb6691a1
SHA256e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3
SHA5124516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3
-
Filesize
122KB
MD5aa36a47283654c7ab1895506b8515a2d
SHA133807366499e16e74a113918c8c83ee8bb6691a1
SHA256e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3
SHA5124516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3
-
Filesize
5KB
MD51134c62e0288f4e81ff7b4dbbd9f006a
SHA1c3b1575c9985a45ab5f6a3007be8954965396bb8
SHA256cd91a176dd5f4dbcafba104cec3553cb6a3a94a8729b0519a96ae3ef84ea9e13
SHA51278ceae0a93a9da978bbe04f707cc9f441baf598a212f1bda5a06f53f6ce03250dad76bf39be89db8ff660f6f2a05b628c9788118886e99e0e7a198ad0354e711
-
Filesize
122KB
MD5aa36a47283654c7ab1895506b8515a2d
SHA133807366499e16e74a113918c8c83ee8bb6691a1
SHA256e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3
SHA5124516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3
-
Filesize
122KB
MD5aa36a47283654c7ab1895506b8515a2d
SHA133807366499e16e74a113918c8c83ee8bb6691a1
SHA256e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3
SHA5124516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3
-
Filesize
122KB
MD5aa36a47283654c7ab1895506b8515a2d
SHA133807366499e16e74a113918c8c83ee8bb6691a1
SHA256e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3
SHA5124516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3