Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
PO09865425670.jar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO09865425670.jar
Resource
win10v2004-20230220-en
General
-
Target
PO09865425670.jar
-
Size
2.2MB
-
MD5
0f0b8dea06b24a29885b6b21f82cc087
-
SHA1
59fb2e978ba606875635ac53a34bfa16d14a7764
-
SHA256
2a1bc5e1909989a631215b04da3e809b39c855a5af0f695bc22e0aabc478ebfd
-
SHA512
88e6c1e09eb65878f8820f2999b64309b9b4d8c1b7768421a4da9b4717a005122e005d15674b220bdcea4da2d8a5db8c30d5efce13731b764f55f136193ae7a8
-
SSDEEP
49152:dSlU0u7xRYSXcqqv5EzaKYGzU0u7xRYSXcqqv5EzaKYGK:dSlE7H5A5ElzE7H5A5ElK
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.ionos.mx - Port:
587 - Username:
[email protected] - Password:
Ku77yE-Mail-1980.! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation bEskWMBU.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation hXJVAgyXjf.exe -
Executes dropped EXE 5 IoCs
pid Process 4340 hXJVAgyXjf.exe 5008 bEskWMBU.exe 4300 bEskWMBU.exe 2384 hXJVAgyXjf.exe 3884 hXJVAgyXjf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bEskWMBU.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bEskWMBU.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bEskWMBU.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hXJVAgyXjf.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hXJVAgyXjf.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hXJVAgyXjf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5008 set thread context of 4300 5008 bEskWMBU.exe 102 PID 4340 set thread context of 3884 4340 hXJVAgyXjf.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3692 schtasks.exe 1252 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4320 powershell.exe 824 powershell.exe 4340 hXJVAgyXjf.exe 4340 hXJVAgyXjf.exe 4320 powershell.exe 824 powershell.exe 4300 bEskWMBU.exe 4300 bEskWMBU.exe 3884 hXJVAgyXjf.exe 3884 hXJVAgyXjf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4320 powershell.exe Token: SeDebugPrivilege 824 powershell.exe Token: SeDebugPrivilege 4300 bEskWMBU.exe Token: SeDebugPrivilege 4340 hXJVAgyXjf.exe Token: SeDebugPrivilege 3884 hXJVAgyXjf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4416 java.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4340 4416 java.exe 85 PID 4416 wrote to memory of 4340 4416 java.exe 85 PID 4416 wrote to memory of 4340 4416 java.exe 85 PID 4416 wrote to memory of 5008 4416 java.exe 86 PID 4416 wrote to memory of 5008 4416 java.exe 86 PID 4416 wrote to memory of 5008 4416 java.exe 86 PID 5008 wrote to memory of 824 5008 bEskWMBU.exe 94 PID 5008 wrote to memory of 824 5008 bEskWMBU.exe 94 PID 5008 wrote to memory of 824 5008 bEskWMBU.exe 94 PID 4340 wrote to memory of 4320 4340 hXJVAgyXjf.exe 95 PID 4340 wrote to memory of 4320 4340 hXJVAgyXjf.exe 95 PID 4340 wrote to memory of 4320 4340 hXJVAgyXjf.exe 95 PID 5008 wrote to memory of 3692 5008 bEskWMBU.exe 98 PID 5008 wrote to memory of 3692 5008 bEskWMBU.exe 98 PID 5008 wrote to memory of 3692 5008 bEskWMBU.exe 98 PID 4340 wrote to memory of 1252 4340 hXJVAgyXjf.exe 100 PID 4340 wrote to memory of 1252 4340 hXJVAgyXjf.exe 100 PID 4340 wrote to memory of 1252 4340 hXJVAgyXjf.exe 100 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 5008 wrote to memory of 4300 5008 bEskWMBU.exe 102 PID 4340 wrote to memory of 2384 4340 hXJVAgyXjf.exe 103 PID 4340 wrote to memory of 2384 4340 hXJVAgyXjf.exe 103 PID 4340 wrote to memory of 2384 4340 hXJVAgyXjf.exe 103 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 PID 4340 wrote to memory of 3884 4340 hXJVAgyXjf.exe 104 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hXJVAgyXjf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 hXJVAgyXjf.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\PO09865425670.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\hXJVAgyXjf.exeC:\Users\Admin\hXJVAgyXjf.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pIoKZpGQgWVaD.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIoKZpGQgWVaD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3BE0.tmp"3⤵
- Creates scheduled task(s)
PID:1252
-
-
C:\Users\Admin\hXJVAgyXjf.exe"C:\Users\Admin\hXJVAgyXjf.exe"3⤵
- Executes dropped EXE
PID:2384
-
-
C:\Users\Admin\hXJVAgyXjf.exe"C:\Users\Admin\hXJVAgyXjf.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3884
-
-
-
C:\Users\Admin\bEskWMBU.exe"C:\Users\Admin\bEskWMBU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pIoKZpGQgWVaD.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pIoKZpGQgWVaD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3BD0.tmp"3⤵
- Creates scheduled task(s)
PID:3692
-
-
C:\Users\Admin\bEskWMBU.exe"C:\Users\Admin\bEskWMBU.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5c37f8f5c442b308c1bf7fe2021e00ab9
SHA1aea0fe34408e836cfacd8c377403585864852bef
SHA2563df4adf84705e5c58f64c96d82bce71991098ddebe0ef8f699e3b8308009f251
SHA512e6fc861f548178afd164cac80ff5d79184d88ba9d58ec3d7b41ba61f9a2ebed66a5657c21fbabbcf68a75f47eec659774b221c3f0b35f3c8eb7f5dd7ffdc694d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5625e4ed865dac665370cbea608902e75
SHA160353d7dd06a21adbe042aa5ae2f54c4e84f9c83
SHA256900368382b3d317623fd3a255d2dd8d66cc02549c6a19ccdd80e95d25c4085ad
SHA512e7c4e156068f7480828eb476fe9dbeed312eb129fd2b1fe91b4176ef01b9b194090474428205246118111d4dbd7b1d4f7e5749ba87e9644468b950540d4e9818
-
Filesize
1KB
MD5625e4ed865dac665370cbea608902e75
SHA160353d7dd06a21adbe042aa5ae2f54c4e84f9c83
SHA256900368382b3d317623fd3a255d2dd8d66cc02549c6a19ccdd80e95d25c4085ad
SHA512e7c4e156068f7480828eb476fe9dbeed312eb129fd2b1fe91b4176ef01b9b194090474428205246118111d4dbd7b1d4f7e5749ba87e9644468b950540d4e9818
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac
-
Filesize
1.0MB
MD5ed2572a67d7ca932dac4f4a1672738e9
SHA17566a290ab1f72c3fb9ab24003565fdc8e4c5183
SHA25628680b3d5a4273df5547840e280718d6b2333ffa630d735814c38fe094d97c2b
SHA512ef04791a5f18f51b38b558a69dea1e470c951e38b8414baa7258ea4e064d916d33e32204e875c58594d55ba409fdf276c32d162864ca98341f52c362a96663ac