Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
unzz.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
unzz.exe
Resource
win10v2004-20220901-en
General
-
Target
unzz.exe
-
Size
315KB
-
MD5
70a72d5298414f3d38bc10e694a858d9
-
SHA1
a15a8053add9243366f406145a25f21cd81bd4b2
-
SHA256
95bb664ebb57018a7c4e89ec8c9a78bc3aab2e580ac415a51e8416e292206afe
-
SHA512
b10801c6a316cef36baf5968ce02c046d50df2404cad74f2ed82524c011029a55d8d5edcb58931efa738c0cc49d036a3d4b1d26f029130f234cfdd374ea2a0bc
-
SSDEEP
6144:vYa6Bb6oGPEOuppH26oEMHaseG64X1uD1HWFJzJRNLuFHhLHq:vYLb6FsPR2YMHas9X1BzobK
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2248 bvuytlmlzl.exe 2624 bvuytlmlzl.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bvuytlmlzl.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bvuytlmlzl.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bvuytlmlzl.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 2624 2248 bvuytlmlzl.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2248 bvuytlmlzl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2624 bvuytlmlzl.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 bvuytlmlzl.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2248 2976 unzz.exe 80 PID 2976 wrote to memory of 2248 2976 unzz.exe 80 PID 2976 wrote to memory of 2248 2976 unzz.exe 80 PID 2248 wrote to memory of 2624 2248 bvuytlmlzl.exe 81 PID 2248 wrote to memory of 2624 2248 bvuytlmlzl.exe 81 PID 2248 wrote to memory of 2624 2248 bvuytlmlzl.exe 81 PID 2248 wrote to memory of 2624 2248 bvuytlmlzl.exe 81 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bvuytlmlzl.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bvuytlmlzl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\unzz.exe"C:\Users\Admin\AppData\Local\Temp\unzz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\bvuytlmlzl.exe"C:\Users\Admin\AppData\Local\Temp\bvuytlmlzl.exe" C:\Users\Admin\AppData\Local\Temp\fqcloo.m2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\bvuytlmlzl.exe"C:\Users\Admin\AppData\Local\Temp\bvuytlmlzl.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5ee91396f4e6b4650f6508d12ba854aa8
SHA10774ce0ca540f23641ce2e339502e63471446035
SHA25642dd77c14108c16cef74181bf8655fe7ee99bc425d1d2a17406184560252bfc2
SHA512ca07b01fadbadc6b2b1cc83e1c8201504330bf415e4976de037e9173d87f6751fe7ab157ab4e05131c66d7144bc7d8c491007a7a84c54e6f8169339622655bb6
-
Filesize
120KB
MD5ee91396f4e6b4650f6508d12ba854aa8
SHA10774ce0ca540f23641ce2e339502e63471446035
SHA25642dd77c14108c16cef74181bf8655fe7ee99bc425d1d2a17406184560252bfc2
SHA512ca07b01fadbadc6b2b1cc83e1c8201504330bf415e4976de037e9173d87f6751fe7ab157ab4e05131c66d7144bc7d8c491007a7a84c54e6f8169339622655bb6
-
Filesize
120KB
MD5ee91396f4e6b4650f6508d12ba854aa8
SHA10774ce0ca540f23641ce2e339502e63471446035
SHA25642dd77c14108c16cef74181bf8655fe7ee99bc425d1d2a17406184560252bfc2
SHA512ca07b01fadbadc6b2b1cc83e1c8201504330bf415e4976de037e9173d87f6751fe7ab157ab4e05131c66d7144bc7d8c491007a7a84c54e6f8169339622655bb6
-
Filesize
5KB
MD50a79d6d44ad6d8e9fc1b72a1876089a5
SHA10f75f3875bff04542ad3b787c849867dbd6dc19f
SHA2569adc776896b7b47d9e5837cc36deea11a09a39171ec60f33704aa255a658d0f3
SHA512def6d94395f3e4799e297cc910c4398ff5979506cffcced752215adce714f1b450b4424c135d6e9c9ac5ef781bdb2ab877ed98809dc226d7db9d363a7d76406e
-
Filesize
262KB
MD50f74daf03becf210f6bd84306fea3e2d
SHA1543959d78d5cb987f0e30042a2a4c48b491025eb
SHA2569d1da7017882fb2c0f84c615aa480a00463684dc32e243b8cd492b42204e17ac
SHA5121f824f5a96e9aef7effbed7532c6212d63fde02d4e347353ac419dd4fe8d2a7bffa7a4be812ee7bc341dc66c51b73c8566334761f779fca82df312dea8214ea4