Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/05/2023, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
lAHgm0rzo1OL1al.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
lAHgm0rzo1OL1al.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
lAHgm0rzo1OL1al.exe
Resource
win10v2004-20230221-en
General
-
Target
lAHgm0rzo1OL1al.exe
-
Size
618KB
-
MD5
73488a3b6e829f9db5c5aa5f49eb65ee
-
SHA1
fc8be556d3978886c5c24c337c3968b70eb25957
-
SHA256
5cc001e3afe60ede3ccb6f6ad0baea1ba1d93f6b87af499faecd54ad12a481f4
-
SHA512
a676d47712ef3f76a38a7725428a425ffc9284303afe6a1342caef638452c44ac1d3d69234cb33bd67835a8e2878e655a4540c91e3cc92df3a51ce0284631b54
-
SSDEEP
12288:mxAwhh2Y4YsBOFuLKii6TfNvlPRVt/yHNLNoe+xncEB5eyxBumL8:lwhh2TAFuL/i6TfNvlfleNunxXuyxBu4
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.delivr-it.com - Port:
587 - Username:
[email protected] - Password:
lZrImFsJ1 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lAHgm0rzo1OL1al.exe Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lAHgm0rzo1OL1al.exe Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lAHgm0rzo1OL1al.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\bNCNCFD = "C:\\Users\\Admin\\AppData\\Roaming\\bNCNCFD\\bNCNCFD.exe" lAHgm0rzo1OL1al.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2476 set thread context of 3540 2476 lAHgm0rzo1OL1al.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3280 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2476 lAHgm0rzo1OL1al.exe 2476 lAHgm0rzo1OL1al.exe 2476 lAHgm0rzo1OL1al.exe 2476 lAHgm0rzo1OL1al.exe 5032 powershell.exe 5032 powershell.exe 5032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2476 lAHgm0rzo1OL1al.exe Token: SeDebugPrivilege 5032 powershell.exe Token: SeDebugPrivilege 3540 lAHgm0rzo1OL1al.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2476 wrote to memory of 5032 2476 lAHgm0rzo1OL1al.exe 66 PID 2476 wrote to memory of 5032 2476 lAHgm0rzo1OL1al.exe 66 PID 2476 wrote to memory of 5032 2476 lAHgm0rzo1OL1al.exe 66 PID 2476 wrote to memory of 3280 2476 lAHgm0rzo1OL1al.exe 68 PID 2476 wrote to memory of 3280 2476 lAHgm0rzo1OL1al.exe 68 PID 2476 wrote to memory of 3280 2476 lAHgm0rzo1OL1al.exe 68 PID 2476 wrote to memory of 4652 2476 lAHgm0rzo1OL1al.exe 70 PID 2476 wrote to memory of 4652 2476 lAHgm0rzo1OL1al.exe 70 PID 2476 wrote to memory of 4652 2476 lAHgm0rzo1OL1al.exe 70 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 PID 2476 wrote to memory of 3540 2476 lAHgm0rzo1OL1al.exe 71 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lAHgm0rzo1OL1al.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 lAHgm0rzo1OL1al.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lAHgm0rzo1OL1al.exe"C:\Users\Admin\AppData\Local\Temp\lAHgm0rzo1OL1al.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vLInyJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vLInyJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp51E9.tmp"2⤵
- Creates scheduled task(s)
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\lAHgm0rzo1OL1al.exe"C:\Users\Admin\AppData\Local\Temp\lAHgm0rzo1OL1al.exe"2⤵PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\lAHgm0rzo1OL1al.exe"C:\Users\Admin\AppData\Local\Temp\lAHgm0rzo1OL1al.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50006c9d7b72db5e4a90d8801fe7c5f9f
SHA1b18530bff8b2e009ee98d40e77787f158697e2e8
SHA256ac97eb4f8edc25c24ab5608750d219b0572e990108919cd8674c97290fa2d824
SHA5127fcd1c75d4115908dcc51bdda81ad953954e4b2138a27afad9acf191f2299408938b02333ce76b5ef3b21a9d99870d171883c9b4232fed12133c1eb757f86e26
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD5c0b7509c2cc7a719a392021e9b3ddee2
SHA141a10f070c1378eceaa33401a885475dbbc13480
SHA25612b2a010cdce766c2cb7e0ea611e36db044efa5be3e84b26c8149a0353cbf306
SHA5127e851b9a3bd32630824bea6bcb6c050c8c0842127a807332a0dd11f43d3eb4e178f6f21f112daffc62c93138e7b7a1f9b3c2164755cf46dddcf21e23f112fe91