Analysis
-
max time kernel
31s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/03/2023, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
HBL & MBL.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
HBL & MBL.exe
Resource
win10v2004-20230220-en
General
-
Target
HBL & MBL.exe
-
Size
309KB
-
MD5
97ff8e54c1834402a1132f3fe2c0b41d
-
SHA1
0e266fbd3b8e5b4c351e552f003548164a154b56
-
SHA256
e609e746aecbd9c2de5408d774e0998dd2e5f299de09bbce5075f16cdb63e54f
-
SHA512
50d235c73b1a04f31287683c6ee01528f94eef5aeed2112b410698d39e9264d3f9059f1fd7c667f241efe2855ede9a1dfbce70c99f13862e8d69272757c90304
-
SSDEEP
6144:PYa6STAkF/uasCWerTJZ3YDxY93JW5gckVOZ9pztGjWyVZLwSZOHKJSKf:PYcMkF/uas2TnAxY93JlVA9phaWiLcH4
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 1240 mhqosuqhql.exe 1148 mhqosuqhql.exe -
Loads dropped DLL 3 IoCs
pid Process 1408 HBL & MBL.exe 1408 HBL & MBL.exe 1240 mhqosuqhql.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 mhqosuqhql.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 mhqosuqhql.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 mhqosuqhql.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\xtdmirbwgcluqa = "C:\\Users\\Admin\\AppData\\Roaming\\dyien\\wsclhqmvfbkto.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\mhqosuqhql.exe\" C:\\Users\\Admin\\AppData\\L" mhqosuqhql.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1240 set thread context of 1148 1240 mhqosuqhql.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1240 mhqosuqhql.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 mhqosuqhql.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1240 1408 HBL & MBL.exe 28 PID 1408 wrote to memory of 1240 1408 HBL & MBL.exe 28 PID 1408 wrote to memory of 1240 1408 HBL & MBL.exe 28 PID 1408 wrote to memory of 1240 1408 HBL & MBL.exe 28 PID 1240 wrote to memory of 1148 1240 mhqosuqhql.exe 29 PID 1240 wrote to memory of 1148 1240 mhqosuqhql.exe 29 PID 1240 wrote to memory of 1148 1240 mhqosuqhql.exe 29 PID 1240 wrote to memory of 1148 1240 mhqosuqhql.exe 29 PID 1240 wrote to memory of 1148 1240 mhqosuqhql.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 mhqosuqhql.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 mhqosuqhql.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HBL & MBL.exe"C:\Users\Admin\AppData\Local\Temp\HBL & MBL.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\mhqosuqhql.exe"C:\Users\Admin\AppData\Local\Temp\mhqosuqhql.exe" C:\Users\Admin\AppData\Local\Temp\uhlsvjnrgda.ich2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\mhqosuqhql.exe"C:\Users\Admin\AppData\Local\Temp\mhqosuqhql.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74
-
Filesize
262KB
MD5efc46a277b50818e5a704530a2c9c6a9
SHA1074ed389e98c201198d62243bc9299aab084b867
SHA256eae34b3bed8d8ccd3254c38742f602b5c144807cfa8fc575709ae1cfa11ab9f6
SHA512a67f99bdac4b54b6f461be8d9e9d2e39ec5727617c5c6e8099693a6a031c57d53f326c128f29ac0b13a88bfc0c8cd65318f2c232f86b183a6314f6e3c713f81a
-
Filesize
7KB
MD55b30b10518fdf3c3b25268972f0408d1
SHA126b70b1c274f6b54ca25c403d3f7c6fa1dff5bcc
SHA256e520e7f8beb73bec077c0752b1b69a9bd14b234484c942eb879e61a1cce4b1ee
SHA512498626fd14689a7998506ca58cff8300195d95da85cccc7096e7717bca7a190634ba295c6f5d1bbed9d411a79b658ad3271bf061fc4937c33fa1afd392f90d98
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74
-
Filesize
99KB
MD5e65b75903b7cacc3d5a9c24a53e62b65
SHA1328777edf28d25ce781d361bbcde7d4a144c8c63
SHA2569634f0656662436753dbed4ccaf4ba42b858020bfcb827e0dff615cbcc8f3642
SHA512d128e7022239bf026d9507a46fd5c0350f56785392dac67044f876623d15da3d08de873eafe16c2c0b363e71f55dadd1bd480ec906ec1ddc02f1af868d43db74