Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
62,842.51 USD and 31,101.87 EUR.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62,842.51 USD and 31,101.87 EUR.exe
Resource
win10v2004-20221111-en
General
-
Target
62,842.51 USD and 31,101.87 EUR.exe
-
Size
621KB
-
MD5
99f142a65dd803dd704c905791acf872
-
SHA1
083d7f5c6541de8cf7de76d5200a363c11a03536
-
SHA256
3f62671f8ab8df6e9357899dbcde6858148e313ad4f8553efe2c1919722a9a79
-
SHA512
18178cb5cd07ca29c12bee3cb14d2e85047393db1a802f56c417dc585b3b56df640352b875496cf7b5f57e2aaf50a5945c9e68fdda743feec521b992a50e205f
-
SSDEEP
12288:V5ecesFP3+NTVXqM+n1xiqwqij42mF5n9:ucesFP+/jQxVijzIZ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hrtstoolinq.com - Port:
587 - Username:
[email protected] - Password:
D%LKvzL4 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 62,842.51 USD and 31,101.87 EUR.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 62,842.51 USD and 31,101.87 EUR.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 62,842.51 USD and 31,101.87 EUR.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 62,842.51 USD and 31,101.87 EUR.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MpZZj = "C:\\Users\\Admin\\AppData\\Roaming\\MpZZj\\MpZZj.exe" 62,842.51 USD and 31,101.87 EUR.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 api.ipify.org 57 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1528 set thread context of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1528 62,842.51 USD and 31,101.87 EUR.exe 1528 62,842.51 USD and 31,101.87 EUR.exe 4216 powershell.exe 4216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1528 62,842.51 USD and 31,101.87 EUR.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 3724 62,842.51 USD and 31,101.87 EUR.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3724 62,842.51 USD and 31,101.87 EUR.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4216 1528 62,842.51 USD and 31,101.87 EUR.exe 87 PID 1528 wrote to memory of 4216 1528 62,842.51 USD and 31,101.87 EUR.exe 87 PID 1528 wrote to memory of 4216 1528 62,842.51 USD and 31,101.87 EUR.exe 87 PID 1528 wrote to memory of 3584 1528 62,842.51 USD and 31,101.87 EUR.exe 89 PID 1528 wrote to memory of 3584 1528 62,842.51 USD and 31,101.87 EUR.exe 89 PID 1528 wrote to memory of 3584 1528 62,842.51 USD and 31,101.87 EUR.exe 89 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 PID 1528 wrote to memory of 3724 1528 62,842.51 USD and 31,101.87 EUR.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 62,842.51 USD and 31,101.87 EUR.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 62,842.51 USD and 31,101.87 EUR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62,842.51 USD and 31,101.87 EUR.exe"C:\Users\Admin\AppData\Local\Temp\62,842.51 USD and 31,101.87 EUR.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lwXzzpXjwQnUw.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lwXzzpXjwQnUw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp30B5.tmp"2⤵
- Creates scheduled task(s)
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\62,842.51 USD and 31,101.87 EUR.exe"C:\Users\Admin\AppData\Local\Temp\62,842.51 USD and 31,101.87 EUR.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eba916dde178a6ac10389ef704d8d54d
SHA17d349fc123849476cb7dfb4e863ec48805c25032
SHA2565cee4338a49b1a269ec41626b57c0825674ef630a26bb0a04f6fed67fc83f700
SHA51298aa4294a66d8f6dc98cbdda4b9b792d36e1608ea4712332a49fe59e3718cca727308e41736dd03563db120aba7fa3a446b855dd7daea2d2114ab39c1f4ae853