Analysis

  • max time kernel
    52s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2023 10:18

General

  • Target

    RFQ#86533-UNITECH STEEL.exe

  • Size

    511KB

  • MD5

    24a89977403150a12cc80edfef8cba76

  • SHA1

    2ab1dbaf5a43dbfaed3f9c007f6ba2330674e1a1

  • SHA256

    506b482e8d326b6c5b603061768faa782cd3992f42fd13635405565ff6e438ee

  • SHA512

    83debdfe71aad18b60dae8d2e99bcb5256e4b3cc2aa1ed829078b714c186398d2b5b9cd8b0db138c5ca44bfdb37d7a3a2374f25ade663394ce1d4f958ba2e22b

  • SSDEEP

    6144:yYa6shAp081nNxvOjqKoeKZJL/P7SlRl7EYO886VEqWfWPF61X93:yYS6nvmjqKoeeVOlRlwfT6qfuI1N

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ#86533-UNITECH STEEL.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ#86533-UNITECH STEEL.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe
      "C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe" C:\Users\Admin\AppData\Local\Temp\gicchqvb.gh
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe
        "C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cvhqvjfdxp.mb

    Filesize

    266KB

    MD5

    4d1b445dd9303bd0de0ad0e0eacd3e86

    SHA1

    622d17dac5471cc10297d8bcf826b67fd811bfd7

    SHA256

    0dab7defef35b06e2ee8f081008b03d4b4aee78768f09fa339f7888a97dc1adc

    SHA512

    aec7646c268c93a4327830ca3180acb0fa197106e9df165afc7016dff458e2092a78eb58a5a800092399f143105e0e41937f87de6183a548612f0d0f2d120a18

  • C:\Users\Admin\AppData\Local\Temp\gicchqvb.gh

    Filesize

    5KB

    MD5

    6f518f4cf16fe57286db69535be3eec6

    SHA1

    c9d81d8ce5bc3e98691ff20b0be170918d0fccfd

    SHA256

    d4f9edd22ae05a162ad746d52dd0ee2645f5d23484474d0a066154d5a943e3f0

    SHA512

    1fcd036ee693a3432e81271768dacceaafbf9c892c324bf07131897243060d8c39cb6941483dd53bf94bb91bd0c0117459e7fbcaf1a7ef02fc072561ae3d2cab

  • C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • C:\Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • \Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • \Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • \Users\Admin\AppData\Local\Temp\wbiajhae.exe

    Filesize

    59KB

    MD5

    0ff97438692fa1c5fe09ecf5dfd6512a

    SHA1

    06c7cae270bfa7e374e086adfad39471569569e4

    SHA256

    b61eb3feaa0a3de53108c94b4c69262ad70e8304b942b4c953427561abdb91b3

    SHA512

    90d659ba0a390a3e35ae35ef4c893182419213cab4a41b9140bca196b7ff49668d55119efd488c7a75c44396e0e17bc63d193dbfd7613e9c9f9a21cb277829e0

  • memory/1212-68-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1212-72-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1212-73-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1212-74-0x0000000000240000-0x0000000000270000-memory.dmp

    Filesize

    192KB

  • memory/1212-75-0x0000000004900000-0x0000000004940000-memory.dmp

    Filesize

    256KB

  • memory/1212-76-0x0000000004900000-0x0000000004940000-memory.dmp

    Filesize

    256KB

  • memory/1212-77-0x0000000004900000-0x0000000004940000-memory.dmp

    Filesize

    256KB