Analysis
-
max time kernel
79s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOC.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SHIPPING DOC.exe
Resource
win10v2004-20230221-en
General
-
Target
SHIPPING DOC.exe
-
Size
291KB
-
MD5
39b9ca7a4ae24827c6023ec5302e4f3e
-
SHA1
f4a960435324066317ae6f02a08ebd8275e35ba5
-
SHA256
d1a22dda5220ba19084b3e191aa4cf0028dc48e3176294f3bc298f0d4936de03
-
SHA512
3c61c3a67782ed74551bae3f4cb4b002a79039fb5f9d6d78f78bc01b56d12a61235fb7699625486499bca03b151be0c8d6559ff3e9daa3505fb838d330c36136
-
SSDEEP
6144:/Ya6A3+cPY5fsTruy2rfGVfvjYmA85YrzLUIIwhSYKCuuYlzkD:/Y23fY3ruhksY3LUIB3VukD
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 4620 wdkhjccu.exe 1412 wdkhjccu.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wdkhjccu.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wdkhjccu.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wdkhjccu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4620 set thread context of 1412 4620 wdkhjccu.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4620 wdkhjccu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1412 wdkhjccu.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4620 1644 SHIPPING DOC.exe 85 PID 1644 wrote to memory of 4620 1644 SHIPPING DOC.exe 85 PID 1644 wrote to memory of 4620 1644 SHIPPING DOC.exe 85 PID 4620 wrote to memory of 1412 4620 wdkhjccu.exe 86 PID 4620 wrote to memory of 1412 4620 wdkhjccu.exe 86 PID 4620 wrote to memory of 1412 4620 wdkhjccu.exe 86 PID 4620 wrote to memory of 1412 4620 wdkhjccu.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wdkhjccu.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wdkhjccu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\wdkhjccu.exe"C:\Users\Admin\AppData\Local\Temp\wdkhjccu.exe" C:\Users\Admin\AppData\Local\Temp\tvgvcczil.vj2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\wdkhjccu.exe"C:\Users\Admin\AppData\Local\Temp\wdkhjccu.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD50a52ae3f58ac25cace9b55f33178f4e7
SHA1a3688148c209b864aca708a10bf9081fbf30e5ed
SHA256767393eed45e630ea4314d3056c6ce54e38016356775429d2bad825e42923c84
SHA512fa1fdb329fee524dd06df4a91b8130b9d93aa96f7a9202a7c82310d60c134c0b148e9b4f0f7c18a55e26a3c00039fe1dbbcad9c4371e3d72053148003a9ed835
-
Filesize
5KB
MD58a8badedeb39ac76c4199e8690e5fddb
SHA1d8b8e5931d3d28989ffc9157606f558aa9708335
SHA256eb28e351bbb8350ab7470ad5d2b6975a28196efcf8b344c10fb12387422df025
SHA5123de87bb7d6706277e7a025bfc58f92e9d120da9fde36d7172e370cf3d9059f8c8f6826c7b531e86eb5014d0f73e3021ccbb977803fd4f837ac7e1a351e1b4d27
-
Filesize
59KB
MD55488a46eaf4e15a3ceb9ba2872325fa2
SHA1939eb78e95aa57b68a67d516d726db3fbdb31825
SHA2563ccf3199ef364344ff57ced7e34fd933300ea091b94fba2f9ca061b32aaab9c8
SHA51220cb1527b21ff530b7de1aac07621a2217ea61dea449eaa4d330a81f80e7b68f7e60ca67a825aa25f488c11795ae028eff9fd9a93142cf74fc48a159097a4a39
-
Filesize
59KB
MD55488a46eaf4e15a3ceb9ba2872325fa2
SHA1939eb78e95aa57b68a67d516d726db3fbdb31825
SHA2563ccf3199ef364344ff57ced7e34fd933300ea091b94fba2f9ca061b32aaab9c8
SHA51220cb1527b21ff530b7de1aac07621a2217ea61dea449eaa4d330a81f80e7b68f7e60ca67a825aa25f488c11795ae028eff9fd9a93142cf74fc48a159097a4a39
-
Filesize
59KB
MD55488a46eaf4e15a3ceb9ba2872325fa2
SHA1939eb78e95aa57b68a67d516d726db3fbdb31825
SHA2563ccf3199ef364344ff57ced7e34fd933300ea091b94fba2f9ca061b32aaab9c8
SHA51220cb1527b21ff530b7de1aac07621a2217ea61dea449eaa4d330a81f80e7b68f7e60ca67a825aa25f488c11795ae028eff9fd9a93142cf74fc48a159097a4a39