Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2023 01:30
Behavioral task
behavioral1
Sample
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
Resource
win10v2004-20230220-en
General
-
Target
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
-
Size
6KB
-
MD5
8402ed726c49025989f98d23ce9d7e3e
-
SHA1
e5784d2999ab073773b65e7d3a10ab2bb3460ff0
-
SHA256
5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb
-
SHA512
208fdd79dd0ff0a61a0dccc80ea718b6f6ef18151104d3d74753035e7ed2844facc07df1605af42dfbb6631971eff6e5ec4cecbbe42f93bef0e3c75d5c942ebc
-
SSDEEP
96:gzTFJVQ7mAK9KgeRZskYuIH7dYYyWwRkvPzNt:gHa7m79ETSuIH7dYYyYR
Malware Config
Extracted
purecrypter
https://files.catbox.moe/6dlgj3.mp4
Extracted
agenttesla
https://api.telegram.org/bot2100759405:AAFzA0s7LpNOhvzQJo2bUlDpzSqnB8ir69o/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jwjfonzfp = "\"C:\\Users\\Admin\\AppData\\Roaming\\Jwjfonzfp.exe\"" 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org 23 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3524 set thread context of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 3808 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 3808 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe Token: SeDebugPrivilege 3808 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4356 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 83 PID 3524 wrote to memory of 4356 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 83 PID 3524 wrote to memory of 4356 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 83 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 PID 3524 wrote to memory of 3808 3524 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe"C:\Users\Admin\AppData\Local\Temp\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exeC:\Users\Admin\AppData\Local\Temp\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe2⤵PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exeC:\Users\Admin\AppData\Local\Temp\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5780663f3e32e0308caa2cc657ccdcaadf393f22d2c1c3c1f5afa9f55aa136bb.exe.log
Filesize1KB
MD5f3eb81974dc5933681e933f07209ff5f
SHA17af8cae0f1d03e82daaf784df9886705685baac7
SHA256e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2
SHA512d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff