Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2023 08:20
Static task
static1
Behavioral task
behavioral1
Sample
Statement of Account.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Statement of Account.exe
Resource
win10v2004-20230703-en
General
-
Target
Statement of Account.exe
-
Size
374KB
-
MD5
d63fd2dc2789389acc18b3692ee74fb3
-
SHA1
93aab7603ca6b92ca30633fff678e705b4a78161
-
SHA256
0a8f6e16fbacee3c0e929af360aab8f396937f31ebd07344f0ac295465071b45
-
SHA512
87688f239f9e06b7ddd5ebfd128c05a354126ea1640a95588c13e7a6376de78a0dd698294318f20adbd35a09ad0a5d203425cd9175bfb3dc8c5d673061154bed
-
SSDEEP
6144:vYa6paKA2ZWu8Q+dxEqasuxi7znzyA6RR1+YLCkxy9B3nhP6INOKkS/aGo56H3h:vYraKA2ou8LdksLXzIf1Zmkxy9BnkMZ1
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 2428 Statement of Account.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement of Account.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement of Account.exe Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement of Account.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2428 set thread context of 4780 2428 Statement of Account.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 Statement of Account.exe 4780 Statement of Account.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2428 Statement of Account.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4780 Statement of Account.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4780 2428 Statement of Account.exe 83 PID 2428 wrote to memory of 4780 2428 Statement of Account.exe 83 PID 2428 wrote to memory of 4780 2428 Statement of Account.exe 83 PID 2428 wrote to memory of 4780 2428 Statement of Account.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement of Account.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Statement of Account.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement of Account.exe"C:\Users\Admin\AppData\Local\Temp\Statement of Account.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Statement of Account.exe"C:\Users\Admin\AppData\Local\Temp\Statement of Account.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD53d4c28d1f511a9aae8bdd8781daeb1db
SHA184de2a4278d1954a3a25721e1b55a901e818ba4c
SHA256beb6eb545dbf839bc274acadc7b5ca0f2984ea750c4ffae19b0ca78f2e74922f
SHA5125c782a1e41d6d15c550cd76cded3a5f67f62aead0a90f7ebdee168a9afa367dc9781d6aa63ca03dee346f93130dd6bb619a0128c1c239cac3380ba7f5cdcb249