Analysis

  • max time kernel
    38s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2023, 06:19

General

  • Target

    faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe

  • Size

    323KB

  • MD5

    282da519a6b85649d64ec53f9943d4b1

  • SHA1

    18b1001d2caf463778507fc16ef290bc5bc04620

  • SHA256

    faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04

  • SHA512

    c85533c0eba8e369c60a948553e1dd29d7fdd1e7149ea040c3feedaae260bbe9e4f64c144d34b8fd176b7de5eae7597f6c7c2e80871fc28197da992a5341aaa5

  • SSDEEP

    6144:/Ya635XwYp7ZepeoEI9AYoaITHp1PDA5qFxKnvRM7hcX5H:/Yl5XwYpcgojrgbLA5sxKn5Msh

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe
    "C:\Users\Admin\AppData\Local\Temp\faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe
      "C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe" C:\Users\Admin\AppData\Local\Temp\biwaela.t
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe
        "C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"
        3⤵
        • Executes dropped EXE
        PID:1684
      • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe
        "C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\biwaela.t

    Filesize

    5KB

    MD5

    c8ca0d917a2da7fa753243ee9345ab9e

    SHA1

    888730566e3fa4caf7fa6fae9153294fb1eddb7f

    SHA256

    10ad588e534fbf964779eed500e70e4856ff40dff9e8811c2a0a6e1a0008c67f

    SHA512

    3c664f5bf5eec0b6eab6dedaaccf14c2892ec06c6d6a0e4e87a0b8eab4fcda5851919f9b8573c9bc52efa88fbf5d768d282d9cbd71cc35c828255ecbe11cf2f4

  • C:\Users\Admin\AppData\Local\Temp\ddgoh.iv

    Filesize

    315KB

    MD5

    53d3a481a70c42f455b23fcb7d51edcc

    SHA1

    882037b2b938594cbe96da4df39e7dc356d31fe9

    SHA256

    9352e56683bb7f269af3fbbf94d0983ddfa4f86ded203f8ad085a81ecaa765d7

    SHA512

    b1c04646ce1d9f9ddd50a41a6649e40ddbe89983561d1ba59a529723bed3c421e5a7a90a09a1bc3d5d87717c601a8ba1792224d16b3a27bc22b9636e3e75ab2f

  • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • \Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • \Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • \Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • \Users\Admin\AppData\Local\Temp\xwxglxhmw.exe

    Filesize

    59KB

    MD5

    11422760805e71534c36b3daf844b029

    SHA1

    6a3292d5599cd474e900a5c182665774699b742c

    SHA256

    356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258

    SHA512

    0a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a

  • memory/464-70-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/464-73-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/464-75-0x0000000000260000-0x000000000029C000-memory.dmp

    Filesize

    240KB

  • memory/464-76-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/464-77-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/464-78-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB