Analysis
-
max time kernel
108s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 09:29
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order _ CCI-12623-11.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order _ CCI-12623-11.exe
Resource
win10v2004-20230220-en
General
-
Target
Purchase Order _ CCI-12623-11.exe
-
Size
647KB
-
MD5
a264328f4b1486826ed7b0c3d8d428bf
-
SHA1
bfc9d56eb0438268ae48d8082307e1178ff9a04e
-
SHA256
d1b62846981e914c930a4edbe940ddf7af722fc9eb3906b9c9dea438f8934c0c
-
SHA512
731c01f1a7b6bec4b4bdb9b0414075d0ce685a5ca8486694d04927572c0777bc2ef2359fb3770811271deab6009d1c8d23cabdd329d91fed384f4b515b506cbd
-
SSDEEP
12288:/YP92sxyJ30cMwuUEwt7PyjRpsNUojBUQld/Zv2ZE5+7LEv/d9FCSlDM:/YP4REwuUdt76jfZkBU8/v2ZEQLOdzDS
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 4 IoCs
pid Process 4524 xuknv.exe 4400 xuknv.exe 1376 xuknv.exe 1628 xuknv.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xuknv.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xuknv.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xuknv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gpluea = "C:\\Users\\Admin\\AppData\\Roaming\\clhqa\\vfoktpyinwrbw.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\xuknv.exe\" \"C:\\Users\\Admin\\AppData\\Local" xuknv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VvcPRR = "C:\\Users\\Admin\\AppData\\Roaming\\VvcPRR\\VvcPRR.exe" xuknv.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org 26 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4524 set thread context of 1628 4524 xuknv.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4524 xuknv.exe 4524 xuknv.exe 4524 xuknv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 xuknv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4524 xuknv.exe 4524 xuknv.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4524 xuknv.exe 4524 xuknv.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4524 4112 Purchase Order _ CCI-12623-11.exe 84 PID 4112 wrote to memory of 4524 4112 Purchase Order _ CCI-12623-11.exe 84 PID 4112 wrote to memory of 4524 4112 Purchase Order _ CCI-12623-11.exe 84 PID 4524 wrote to memory of 4400 4524 xuknv.exe 85 PID 4524 wrote to memory of 4400 4524 xuknv.exe 85 PID 4524 wrote to memory of 4400 4524 xuknv.exe 85 PID 4524 wrote to memory of 1376 4524 xuknv.exe 86 PID 4524 wrote to memory of 1376 4524 xuknv.exe 86 PID 4524 wrote to memory of 1376 4524 xuknv.exe 86 PID 4524 wrote to memory of 1628 4524 xuknv.exe 87 PID 4524 wrote to memory of 1628 4524 xuknv.exe 87 PID 4524 wrote to memory of 1628 4524 xuknv.exe 87 PID 4524 wrote to memory of 1628 4524 xuknv.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xuknv.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xuknv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order _ CCI-12623-11.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order _ CCI-12623-11.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\xuknv.exe"C:\Users\Admin\AppData\Local\Temp\xuknv.exe" "C:\Users\Admin\AppData\Local\Temp\agnxlu.au3"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\xuknv.exe"C:\Users\Admin\AppData\Local\Temp\xuknv.exe"3⤵
- Executes dropped EXE
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\xuknv.exe"C:\Users\Admin\AppData\Local\Temp\xuknv.exe"3⤵
- Executes dropped EXE
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\xuknv.exe"C:\Users\Admin\AppData\Local\Temp\xuknv.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b2f54c41b1aea695d33a3e43dbff2ee9
SHA1eb1223f61a28101498a7e2893ea508c22af8c80e
SHA2568a411bb6bd349810053c02c53cd0e3dbdf6824314c41092f2bcc7cebacb80b37
SHA512833f9eb737553f2510684022c42ddf37849d86edb3a8d7f228f325cd2e86a464cc856da6defeb3afb793d431dedfdf95d4aba3c5c9f3c2a167ca3ed64ab57d57
-
Filesize
263KB
MD545dad481a2f7a94cef30a5b3965ed364
SHA1404274a71c33454c366b4a3a4754707277ed9283
SHA256c25ccee7976797a0f7cca5f41dffec916748f5d195d183705de59954f8512cb2
SHA51224d4553851fddf82158528b3f4bab86353f9b1168814fc63824e6bc2e684460350c963e588a4140b9ac7423600fe761d71b364b93ba53e4cec1ad459300f7ca1
-
Filesize
71KB
MD5b186d23aa038c0411dc0da0eb833fa6d
SHA15db65ad5810362a0a573f2ea5af425472a23c1fe
SHA25605d54047ac1c833092edb87a6f38a595d43e05b653b057d0846a9cbf3b4c1996
SHA512b4e65602e1917eb71b7b161efaa7859b0126ed1b9f0714e3e9cb5c448342f57a9d16c32ed310b3ec6d06de772019c3bd61f857a80422f10f04c8275173ca86a7
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c