Analysis
-
max time kernel
111s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
294KB
-
MD5
2ff3c88cc079f50ba0000d386f8f208f
-
SHA1
3c8e9271e6eae83788c36874ec7e15c780bc6a77
-
SHA256
4b3b2e33768b07e48c7b2a32ec2e0f0fcd94b2062170b975f5324d77d28105a2
-
SHA512
ab1cffe6c627fdc4ed363de3d7219dffc77e374832e54fc27800fcf62799d4ea3e05e4ed482f1d268747edd43434ad1bf17e5a7f8d21187dd4e00ec1cfa28347
-
SSDEEP
6144:/Ya6RYWU4NPB0erIvWmDVUzlB6TANcHDveE1uj0DHfqXG:/Yz1zNierIeUVq6YcHxckfqXG
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 4672 aihaah.exe 2964 aihaah.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aihaah.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aihaah.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aihaah.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qmrbkfoxtdy = "C:\\Users\\Admin\\AppData\\Roaming\\ibwgbkt\\pyienjscxh.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\aihaah.exe\" C:\\Users\\Admin\\AppData\\Local\\" aihaah.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 api.ipify.org 9 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4672 set thread context of 2964 4672 aihaah.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4672 aihaah.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 aihaah.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 820 wrote to memory of 4672 820 tmp.exe 84 PID 820 wrote to memory of 4672 820 tmp.exe 84 PID 820 wrote to memory of 4672 820 tmp.exe 84 PID 4672 wrote to memory of 2964 4672 aihaah.exe 85 PID 4672 wrote to memory of 2964 4672 aihaah.exe 85 PID 4672 wrote to memory of 2964 4672 aihaah.exe 85 PID 4672 wrote to memory of 2964 4672 aihaah.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aihaah.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aihaah.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\aihaah.exe"C:\Users\Admin\AppData\Local\Temp\aihaah.exe" C:\Users\Admin\AppData\Local\Temp\rqxraj.u2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\aihaah.exe"C:\Users\Admin\AppData\Local\Temp\aihaah.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5126173994331f7784faa6b180e5a2132
SHA1c5a080d4f2d1e7cd59e02ce6aa3438cf73f7e011
SHA25688aa17ff396f40e63bb4f11d4a31a9117204692cd027752da0495fdfb58ff665
SHA5123fbf522e36d4933965f505f0926f207f969f03f8aef8817cd76d9238072b4071a80bb2e437001140dd13fb8a0506f2d7ae215514f3f116641fbadda6b831f914
-
Filesize
60KB
MD5126173994331f7784faa6b180e5a2132
SHA1c5a080d4f2d1e7cd59e02ce6aa3438cf73f7e011
SHA25688aa17ff396f40e63bb4f11d4a31a9117204692cd027752da0495fdfb58ff665
SHA5123fbf522e36d4933965f505f0926f207f969f03f8aef8817cd76d9238072b4071a80bb2e437001140dd13fb8a0506f2d7ae215514f3f116641fbadda6b831f914
-
Filesize
60KB
MD5126173994331f7784faa6b180e5a2132
SHA1c5a080d4f2d1e7cd59e02ce6aa3438cf73f7e011
SHA25688aa17ff396f40e63bb4f11d4a31a9117204692cd027752da0495fdfb58ff665
SHA5123fbf522e36d4933965f505f0926f207f969f03f8aef8817cd76d9238072b4071a80bb2e437001140dd13fb8a0506f2d7ae215514f3f116641fbadda6b831f914
-
Filesize
263KB
MD512582a21e249143b37841f5d1a80c0ec
SHA133b55b80df8eaed3e04a47509f1ecdb9f3d9a3b1
SHA2564b9efdd71edb8620e47d5b85133dc73b12ce4d4ac35a135b4a2c6ba546686a33
SHA512e207963a8402426bcf9eb4fe59b7abdbf207dc0ca4746572884fb2f13f298ae5ab93e0a33d058b50f198fadfa781cd756c715d5ec5a052cddfa6b5b3313b9747
-
Filesize
7KB
MD59ddb9349df7cf50af4b523151109f943
SHA18a823dc4ad81b7711648301e16c780243094b8ad
SHA2569531c86366939cdb986683ed27cf5cb9f5a1ce00cd5402831415cb5b3c9415b4
SHA512f4269b48f39a3a927d99e553c5d5b486cab617dc2e86d59b7a5ef2790c4c1d5343d50a07c6da93ef25fe7445cddfbe026fbdb935b7dc081ed56a12cff32cee98