Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2023, 14:30

General

  • Target

    URGENT REQUEST.exe

  • Size

    309KB

  • MD5

    dc597e0353112898b43b39e8abcae7ab

  • SHA1

    da93f36cdb454f994803c4eb016d4db5cee81ab9

  • SHA256

    5bf208344ea17831afe203650df2ff3412f0c8f4daa5565c510e71ab8ff1644a

  • SHA512

    b311dfb34b7a7cfac4a8964e961bdf2d92734b6db595dd258ad711bbff4affff733d5826a6ed1cd3e275323c509c6da352978e05369f98fd9b6c2f28d8657539

  • SSDEEP

    6144:PYa66MT4PWwDNJPa5C+ZZ6cGITYdFpMBNzShHSOQ/SnYZt/GK/9:PY0Gdwi5P6cGZpPsoYXeK/9

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST.exe
    "C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe
      "C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe" C:\Users\Admin\AppData\Local\Temp\cbxmsjeph.awy
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe
        "C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:284

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\cbxmsjeph.awy

          Filesize

          5KB

          MD5

          4dc2ec2b0dd761b8e36e24340229f1d9

          SHA1

          c6d28b6595c6222820b7623b39a9447d1e07e9c2

          SHA256

          795882b3d8643f3e455b22dd397d6a3883b90b751b36628e90478924f29648c0

          SHA512

          c6609213dd48f370c080ffabebee361b05c3bbada7464a8c55d78dd7bac9b7657a88bc9cd7e4d0fea0bbee2e9ec4371063daf4bd878cee572f10464083ebe762

        • C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • C:\Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • C:\Users\Admin\AppData\Local\Temp\trdnmfkgx.gl

          Filesize

          262KB

          MD5

          9f53db27a80a20caf2c6d5a1e1c5f950

          SHA1

          2641c929dd9e3c3d4734a9da97aeb3555624f80c

          SHA256

          add2f7fc1c6dd98a926feb51cbb478e721a071eb97c2331678c027f9bf5123a0

          SHA512

          102832a430013403fd52c08e27373f46fc73fcef62bb6a182280e9b03e73e9471ca1ac7287e5ae79318dd9fbc3917e1d6fa025602fc62a648e8f965f8af675ca

        • \Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • \Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • \Users\Admin\AppData\Local\Temp\ouwlcss.exe

          Filesize

          97KB

          MD5

          6627770f02dd996dbe6f41a4df48e456

          SHA1

          4890ade0621aae1e39708296b5d9d09a88b05985

          SHA256

          b291edd746336c38a338e957d062b18a43d28e5c8bc34ad0c5fc1efd3555fd03

          SHA512

          46b3caeda405596cb0d4e33c65d511a45fb92be0c34ab21b62d77da30ad53ac3c50d6d83331fa6074dea28f711eab371a17f0b34696d2ebb31e7993944e8da66

        • memory/284-69-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/284-72-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/284-74-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/284-75-0x0000000000450000-0x0000000000480000-memory.dmp

          Filesize

          192KB

        • memory/284-76-0x00000000049A0000-0x00000000049E0000-memory.dmp

          Filesize

          256KB