Analysis

  • max time kernel
    83s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09/02/2023, 09:43

General

  • Target

    BL-SHIPPING DOCUMENT.exe

  • Size

    326KB

  • MD5

    3c0c2e104b46a135df4599e96095bb54

  • SHA1

    923a0fba131a13f55af57fd890b5dd9759ce8937

  • SHA256

    53606fcd5a8f195a763cb48f5aafffac01fdfb8e73d5fe99438ebc2d1eba6eca

  • SHA512

    810d55697c523b14d43ee3a06717eacd5ac9e79950aac2ef31b708fc97b73f7deb6b922b692e0d8056d64e3e5d4b8d2999e02aa96441521dbfd02673bcc8a1c1

  • SSDEEP

    6144:vYa6qWM5HuCUhJtm9r1PKQC9X0dQ7n5dA2vAxwT1R+6cEytNgJaQzkTbW2v:vY0TtnJpPKZ75dVTxXsP73v

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BL-SHIPPING DOCUMENT.exe
    "C:\Users\Admin\AppData\Local\Temp\BL-SHIPPING DOCUMENT.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe
      "C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe" C:\Users\Admin\AppData\Local\Temp\xdlerxqldy.qa
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe
        "C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1180

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\fwhjxqgs.dcq

          Filesize

          262KB

          MD5

          77dfa8df7c6082bded748f061eead865

          SHA1

          ccc750063beb871a0d6f18ce9abddf78fb0d5398

          SHA256

          c4d46af9758781da9e06933b23b37a2617e294d706c0b7f3032165e8efa47b8c

          SHA512

          09cd522a2330cd0f93a56dbc14d53901ac50fc4accf8e6fccb9851e2d352f11650d72e125424726e71c7d02f43062d5f992533ed2c23cc882f28446b3d08106f

        • C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe

          Filesize

          122KB

          MD5

          aa36a47283654c7ab1895506b8515a2d

          SHA1

          33807366499e16e74a113918c8c83ee8bb6691a1

          SHA256

          e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3

          SHA512

          4516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3

        • C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe

          Filesize

          122KB

          MD5

          aa36a47283654c7ab1895506b8515a2d

          SHA1

          33807366499e16e74a113918c8c83ee8bb6691a1

          SHA256

          e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3

          SHA512

          4516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3

        • C:\Users\Admin\AppData\Local\Temp\lxwqfwyb.exe

          Filesize

          122KB

          MD5

          aa36a47283654c7ab1895506b8515a2d

          SHA1

          33807366499e16e74a113918c8c83ee8bb6691a1

          SHA256

          e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3

          SHA512

          4516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3

        • C:\Users\Admin\AppData\Local\Temp\xdlerxqldy.qa

          Filesize

          5KB

          MD5

          1134c62e0288f4e81ff7b4dbbd9f006a

          SHA1

          c3b1575c9985a45ab5f6a3007be8954965396bb8

          SHA256

          cd91a176dd5f4dbcafba104cec3553cb6a3a94a8729b0519a96ae3ef84ea9e13

          SHA512

          78ceae0a93a9da978bbe04f707cc9f441baf598a212f1bda5a06f53f6ce03250dad76bf39be89db8ff660f6f2a05b628c9788118886e99e0e7a198ad0354e711

        • \Users\Admin\AppData\Local\Temp\lxwqfwyb.exe

          Filesize

          122KB

          MD5

          aa36a47283654c7ab1895506b8515a2d

          SHA1

          33807366499e16e74a113918c8c83ee8bb6691a1

          SHA256

          e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3

          SHA512

          4516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3

        • \Users\Admin\AppData\Local\Temp\lxwqfwyb.exe

          Filesize

          122KB

          MD5

          aa36a47283654c7ab1895506b8515a2d

          SHA1

          33807366499e16e74a113918c8c83ee8bb6691a1

          SHA256

          e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3

          SHA512

          4516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3

        • \Users\Admin\AppData\Local\Temp\lxwqfwyb.exe

          Filesize

          122KB

          MD5

          aa36a47283654c7ab1895506b8515a2d

          SHA1

          33807366499e16e74a113918c8c83ee8bb6691a1

          SHA256

          e0e06bd421108ba16b7cb4dcc91133b5cacb314c16477d53d78202a5ef8b82e3

          SHA512

          4516f63069068e11e6d8d41b559214cee250edd1a0bd376cf212ef41a56f509a8ea3bddbb3475618635fc8b9a33f26455f31f750c060b8fd08fef23838b9b7c3

        • memory/112-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

          Filesize

          8KB

        • memory/1180-67-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/1180-68-0x00000000003C0000-0x00000000003F0000-memory.dmp

          Filesize

          192KB