Analysis
-
max time kernel
107s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
276KB
-
MD5
e3602917ee3758b7f6bd1e098d82a9e1
-
SHA1
812a778166e467d3512e0adababe453058d0f13e
-
SHA256
0007f855c65b913a538d9a7680c5078dcdf8f49e26f37a130ec982c275bb693b
-
SHA512
6266862beea704497d97f0d31c8e62ae6814caa78f3d25ee6b7582f0edec43756d79ac74b6bede4c4b06d8ea7859608377ba20110db3fa99359d95d303f0e4f5
-
SSDEEP
6144:PYa6ajbSe4h+mT2g1pZMyg1LgagWbqwFfteR3Se7v6Y:PYcCe4hPMt1Lga1qwFftqCmyY
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2816 wnvjnokxxy.exe 4252 wnvjnokxxy.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wnvjnokxxy.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wnvjnokxxy.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wnvjnokxxy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qmvrbkgpyue = "C:\\Users\\Admin\\AppData\\Roaming\\gcluqa\\jfojscxh.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\wnvjnokxxy.exe\" C:\\Users\\Admin\\AppData\\Local" wnvjnokxxy.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2816 set thread context of 4252 2816 wnvjnokxxy.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2816 wnvjnokxxy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4252 wnvjnokxxy.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2816 2548 tmp.exe 85 PID 2548 wrote to memory of 2816 2548 tmp.exe 85 PID 2548 wrote to memory of 2816 2548 tmp.exe 85 PID 2816 wrote to memory of 4252 2816 wnvjnokxxy.exe 87 PID 2816 wrote to memory of 4252 2816 wnvjnokxxy.exe 87 PID 2816 wrote to memory of 4252 2816 wnvjnokxxy.exe 87 PID 2816 wrote to memory of 4252 2816 wnvjnokxxy.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wnvjnokxxy.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wnvjnokxxy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\wnvjnokxxy.exe"C:\Users\Admin\AppData\Local\Temp\wnvjnokxxy.exe" C:\Users\Admin\AppData\Local\Temp\juyxpwva.zwc2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\wnvjnokxxy.exe"C:\Users\Admin\AppData\Local\Temp\wnvjnokxxy.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4252
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD529d7208c93e91a9b888fe26111a2580f
SHA1116d87d6b87b8a6fa3fca4320a1d06a95b6f6a59
SHA256b61ddb5658fd971cb0312ddfc9be766548457ba53f971e93db1552609fc21937
SHA51281f471c7e66acf0a3954b257c6135071af40b4e7e697c3f40c1e69cbe36f5a91a71486ecfa67321c385be6fc657672916666b6fbda9d9b1a598e5b386f0dccf2
-
Filesize
7KB
MD500d6e183e3ed31b21323d9c0f19dc7f1
SHA1dd6d70ce237bbb6f4021b00e0f0311fc71db8df8
SHA2561129502b9c04c141615931e76b6e174f820e297298625b8bc362fee20790dd8f
SHA5126308d46e1516da2ea2694de9b6ba29294b83b7bc2c0aaf4aafe65516f3143477e35db547e65221d2d20df9fbf7eb3c2e01d500718054e813c44d34f47137138d
-
Filesize
26KB
MD5cfa51cfa7c6f5bf9fb33b74d80d8948a
SHA1bbd9157baec515385936374e24699ad928508acb
SHA256e0b9509c0aa6ccffa28cf67bc0b733ae6d253537fd38d72d83c813a82aa5b087
SHA51280686ed8462854c2f79ce0807002d6ab3c980431db5f69ba42b3f1cfb152bab7fd2181b5caec1297c76e69f5e8d2a205b5f5cef42f3edacc3cbd6841278eacb5
-
Filesize
26KB
MD5cfa51cfa7c6f5bf9fb33b74d80d8948a
SHA1bbd9157baec515385936374e24699ad928508acb
SHA256e0b9509c0aa6ccffa28cf67bc0b733ae6d253537fd38d72d83c813a82aa5b087
SHA51280686ed8462854c2f79ce0807002d6ab3c980431db5f69ba42b3f1cfb152bab7fd2181b5caec1297c76e69f5e8d2a205b5f5cef42f3edacc3cbd6841278eacb5
-
Filesize
26KB
MD5cfa51cfa7c6f5bf9fb33b74d80d8948a
SHA1bbd9157baec515385936374e24699ad928508acb
SHA256e0b9509c0aa6ccffa28cf67bc0b733ae6d253537fd38d72d83c813a82aa5b087
SHA51280686ed8462854c2f79ce0807002d6ab3c980431db5f69ba42b3f1cfb152bab7fd2181b5caec1297c76e69f5e8d2a205b5f5cef42f3edacc3cbd6841278eacb5