Analysis
-
max time kernel
108s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
SHIPMENT ADVICE.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SHIPMENT ADVICE.exe
Resource
win10v2004-20230220-en
General
-
Target
SHIPMENT ADVICE.exe
-
Size
291KB
-
MD5
e65a0c7076941b4ba2aea0a89d02ab07
-
SHA1
5edda828f7e9ef3275e71cd608e48861f98cad3d
-
SHA256
686579ac798116984a5f68c10fff3ae521d14c3cfc5e7891618a963693dfeb6f
-
SHA512
b78294fa89ce1c2298ee674b1884c632dfb253fa6b105778fbc95575e604ccc8fe908be0312a91d06a69a3eb2dbaf4625b5fd28ac3ad8a23eda03b6c2cf17cf6
-
SSDEEP
6144:/Ya6ues+r6puHTclv1w/z0+Wf9PgEh0sj9hVxrM0B+TbHYz:/YQvZpuHGv1q+oEXhTUYz
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 3360 tjuxxo.exe 100 tjuxxo.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tjuxxo.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tjuxxo.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tjuxxo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3360 set thread context of 100 3360 tjuxxo.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3360 tjuxxo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 100 tjuxxo.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 3360 1716 SHIPMENT ADVICE.exe 88 PID 1716 wrote to memory of 3360 1716 SHIPMENT ADVICE.exe 88 PID 1716 wrote to memory of 3360 1716 SHIPMENT ADVICE.exe 88 PID 3360 wrote to memory of 100 3360 tjuxxo.exe 89 PID 3360 wrote to memory of 100 3360 tjuxxo.exe 89 PID 3360 wrote to memory of 100 3360 tjuxxo.exe 89 PID 3360 wrote to memory of 100 3360 tjuxxo.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tjuxxo.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tjuxxo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPMENT ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\SHIPMENT ADVICE.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\tjuxxo.exe"C:\Users\Admin\AppData\Local\Temp\tjuxxo.exe" C:\Users\Admin\AppData\Local\Temp\anqcelo.ph2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\tjuxxo.exe"C:\Users\Admin\AppData\Local\Temp\tjuxxo.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD556dcb4a4f31c61a3be095cd7bc81ca53
SHA149f5eef20087ca71f2c4690d1ea14c159dca7120
SHA2568b4d683fcfce4c82b46459469724c6703357c33d4996505e5e99d55501c5ef20
SHA512f86da3858df4a7041a7d689604275e159c79f9862f4e5594de0e50d9c00d5deb1988ef2bae941ece69c8501c75bc741ed6ca5eaffe59c66032f9c1078909e424
-
Filesize
59KB
MD5ae4c7bbc487241a0a95144fbac4df140
SHA1ffec7dd60f4dd056c2dfec4da4efd2fa484ea551
SHA256777f30247ffd1c43ced0905634bab80238eaf7f8fc20184a57e9a1a075cff49f
SHA51208cc1b7c38f57d0053ffa08e8539c59ab9130af1286a26fcb00fe8fb58d7cc669f97d2d7b3adbea1937c79f30361d1d94463a684d536b36e5e73968b9afdfa97
-
Filesize
59KB
MD5ae4c7bbc487241a0a95144fbac4df140
SHA1ffec7dd60f4dd056c2dfec4da4efd2fa484ea551
SHA256777f30247ffd1c43ced0905634bab80238eaf7f8fc20184a57e9a1a075cff49f
SHA51208cc1b7c38f57d0053ffa08e8539c59ab9130af1286a26fcb00fe8fb58d7cc669f97d2d7b3adbea1937c79f30361d1d94463a684d536b36e5e73968b9afdfa97
-
Filesize
59KB
MD5ae4c7bbc487241a0a95144fbac4df140
SHA1ffec7dd60f4dd056c2dfec4da4efd2fa484ea551
SHA256777f30247ffd1c43ced0905634bab80238eaf7f8fc20184a57e9a1a075cff49f
SHA51208cc1b7c38f57d0053ffa08e8539c59ab9130af1286a26fcb00fe8fb58d7cc669f97d2d7b3adbea1937c79f30361d1d94463a684d536b36e5e73968b9afdfa97
-
Filesize
262KB
MD55e1b112b130a9fbc891ca77d3a460538
SHA1c46a1341cd59b1ccd4a642383d994e00c3716a01
SHA2568c275e401159d3555f7ec7c3644708050bfff8d40ee17bed8077a4a42a70937e
SHA512b2faa59bfa27d1d5b4aa514d9548cabaea072b7be34068091fb341951fd11bb211b4ea33396a0bea9e0644f5aca2b8ed491cfd21b86ccab8582aaa35925617b6