Analysis
-
max time kernel
52s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2023 10:18
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#86533-UNITECH STEEL.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ#86533-UNITECH STEEL.exe
Resource
win10v2004-20230221-en
General
-
Target
RFQ#86533-UNITECH STEEL.exe
-
Size
511KB
-
MD5
24a89977403150a12cc80edfef8cba76
-
SHA1
2ab1dbaf5a43dbfaed3f9c007f6ba2330674e1a1
-
SHA256
506b482e8d326b6c5b603061768faa782cd3992f42fd13635405565ff6e438ee
-
SHA512
83debdfe71aad18b60dae8d2e99bcb5256e4b3cc2aa1ed829078b714c186398d2b5b9cd8b0db138c5ca44bfdb37d7a3a2374f25ade663394ce1d4f958ba2e22b
-
SSDEEP
6144:yYa6shAp081nNxvOjqKoeKZJL/P7SlRl7EYO886VEqWfWPF61X93:yYS6nvmjqKoeeVOlRlwfT6qfuI1N
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 1332 wbiajhae.exe 1212 wbiajhae.exe -
Loads dropped DLL 3 IoCs
pid Process 1544 RFQ#86533-UNITECH STEEL.exe 1544 RFQ#86533-UNITECH STEEL.exe 1332 wbiajhae.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wbiajhae.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wbiajhae.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wbiajhae.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\newapp = "C:\\Users\\Admin\\AppData\\Roaming\\newapp\\newapp.exe" wbiajhae.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1332 set thread context of 1212 1332 wbiajhae.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1332 wbiajhae.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1212 wbiajhae.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1212 wbiajhae.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1332 1544 RFQ#86533-UNITECH STEEL.exe 28 PID 1544 wrote to memory of 1332 1544 RFQ#86533-UNITECH STEEL.exe 28 PID 1544 wrote to memory of 1332 1544 RFQ#86533-UNITECH STEEL.exe 28 PID 1544 wrote to memory of 1332 1544 RFQ#86533-UNITECH STEEL.exe 28 PID 1332 wrote to memory of 1212 1332 wbiajhae.exe 29 PID 1332 wrote to memory of 1212 1332 wbiajhae.exe 29 PID 1332 wrote to memory of 1212 1332 wbiajhae.exe 29 PID 1332 wrote to memory of 1212 1332 wbiajhae.exe 29 PID 1332 wrote to memory of 1212 1332 wbiajhae.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wbiajhae.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wbiajhae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ#86533-UNITECH STEEL.exe"C:\Users\Admin\AppData\Local\Temp\RFQ#86533-UNITECH STEEL.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe"C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe" C:\Users\Admin\AppData\Local\Temp\gicchqvb.gh2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe"C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1212
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD54d1b445dd9303bd0de0ad0e0eacd3e86
SHA1622d17dac5471cc10297d8bcf826b67fd811bfd7
SHA2560dab7defef35b06e2ee8f081008b03d4b4aee78768f09fa339f7888a97dc1adc
SHA512aec7646c268c93a4327830ca3180acb0fa197106e9df165afc7016dff458e2092a78eb58a5a800092399f143105e0e41937f87de6183a548612f0d0f2d120a18
-
Filesize
5KB
MD56f518f4cf16fe57286db69535be3eec6
SHA1c9d81d8ce5bc3e98691ff20b0be170918d0fccfd
SHA256d4f9edd22ae05a162ad746d52dd0ee2645f5d23484474d0a066154d5a943e3f0
SHA5121fcd036ee693a3432e81271768dacceaafbf9c892c324bf07131897243060d8c39cb6941483dd53bf94bb91bd0c0117459e7fbcaf1a7ef02fc072561ae3d2cab
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0
-
Filesize
59KB
MD50ff97438692fa1c5fe09ecf5dfd6512a
SHA106c7cae270bfa7e374e086adfad39471569569e4
SHA256b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3
SHA51290d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0