Analysis
-
max time kernel
38s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2023, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe
Resource
win10v2004-20230220-en
General
-
Target
faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe
-
Size
323KB
-
MD5
282da519a6b85649d64ec53f9943d4b1
-
SHA1
18b1001d2caf463778507fc16ef290bc5bc04620
-
SHA256
faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04
-
SHA512
c85533c0eba8e369c60a948553e1dd29d7fdd1e7149ea040c3feedaae260bbe9e4f64c144d34b8fd176b7de5eae7597f6c7c2e80871fc28197da992a5341aaa5
-
SSDEEP
6144:/Ya635XwYp7ZepeoEI9AYoaITHp1PDA5qFxKnvRM7hcX5H:/Yl5XwYpcgojrgbLA5sxKn5Msh
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 3 IoCs
pid Process 1172 xwxglxhmw.exe 1684 xwxglxhmw.exe 464 xwxglxhmw.exe -
Loads dropped DLL 4 IoCs
pid Process 832 faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe 832 faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe 1172 xwxglxhmw.exe 1172 xwxglxhmw.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xwxglxhmw.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xwxglxhmw.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xwxglxhmw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1172 set thread context of 464 1172 xwxglxhmw.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 464 xwxglxhmw.exe 464 xwxglxhmw.exe 464 xwxglxhmw.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1172 xwxglxhmw.exe 1172 xwxglxhmw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 464 xwxglxhmw.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 832 wrote to memory of 1172 832 faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe 28 PID 832 wrote to memory of 1172 832 faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe 28 PID 832 wrote to memory of 1172 832 faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe 28 PID 832 wrote to memory of 1172 832 faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe 28 PID 1172 wrote to memory of 1684 1172 xwxglxhmw.exe 29 PID 1172 wrote to memory of 1684 1172 xwxglxhmw.exe 29 PID 1172 wrote to memory of 1684 1172 xwxglxhmw.exe 29 PID 1172 wrote to memory of 1684 1172 xwxglxhmw.exe 29 PID 1172 wrote to memory of 464 1172 xwxglxhmw.exe 30 PID 1172 wrote to memory of 464 1172 xwxglxhmw.exe 30 PID 1172 wrote to memory of 464 1172 xwxglxhmw.exe 30 PID 1172 wrote to memory of 464 1172 xwxglxhmw.exe 30 PID 1172 wrote to memory of 464 1172 xwxglxhmw.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xwxglxhmw.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 xwxglxhmw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe"C:\Users\Admin\AppData\Local\Temp\faf2715b604f9fb6f5774483b2e719220b8dab2d3ac3ced882b991c0220f5a04.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe" C:\Users\Admin\AppData\Local\Temp\biwaela.t2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"3⤵
- Executes dropped EXE
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"C:\Users\Admin\AppData\Local\Temp\xwxglxhmw.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:464
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c8ca0d917a2da7fa753243ee9345ab9e
SHA1888730566e3fa4caf7fa6fae9153294fb1eddb7f
SHA25610ad588e534fbf964779eed500e70e4856ff40dff9e8811c2a0a6e1a0008c67f
SHA5123c664f5bf5eec0b6eab6dedaaccf14c2892ec06c6d6a0e4e87a0b8eab4fcda5851919f9b8573c9bc52efa88fbf5d768d282d9cbd71cc35c828255ecbe11cf2f4
-
Filesize
315KB
MD553d3a481a70c42f455b23fcb7d51edcc
SHA1882037b2b938594cbe96da4df39e7dc356d31fe9
SHA2569352e56683bb7f269af3fbbf94d0983ddfa4f86ded203f8ad085a81ecaa765d7
SHA512b1c04646ce1d9f9ddd50a41a6649e40ddbe89983561d1ba59a529723bed3c421e5a7a90a09a1bc3d5d87717c601a8ba1792224d16b3a27bc22b9636e3e75ab2f
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a
-
Filesize
59KB
MD511422760805e71534c36b3daf844b029
SHA16a3292d5599cd474e900a5c182665774699b742c
SHA256356e7a175d906299eae3c8d5061d5f0602e2d34535bc1b81a5b514ac54129258
SHA5120a0d6b0a8634fe3b632a03b7d6d6d4305c40962554adcf333224b88644e771cb8e57a86842e07a4af235974809087fab24325d3f950d4475018eb97a20d9036a