Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2023 11:49
Static task
static1
Behavioral task
behavioral1
Sample
bf1ed0009a578efe9b871d2ec60e51fb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bf1ed0009a578efe9b871d2ec60e51fb.exe
Resource
win10v2004-20230703-en
General
-
Target
bf1ed0009a578efe9b871d2ec60e51fb.exe
-
Size
293KB
-
MD5
bf1ed0009a578efe9b871d2ec60e51fb
-
SHA1
cbbcc5a4092baa832742f54f185ec21f49ca7c4c
-
SHA256
19e9e83de17d01983fe73b24b034831537e978652e6d6f0d70db6d48c72cb9c2
-
SHA512
152b8e182bf5174da92c8bc26dc615b2dc502cd4a9bed66e48813e93117a6f8a7cf4885acae6023be6ae4f6c75d303e86827d5b7265cfc49b336a6fcf52316d1
-
SSDEEP
6144:vYa6/VzpkfSz+zcHd6IZB+EpsMidjlEhl7jS+HcYgaH4xJIzZHAy9Y:vY1VzOSz+zcHd64UdpxlEPjSlJIzZHA3
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bf1ed0009a578efe9b871d2ec60e51fb.exe Key opened \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bf1ed0009a578efe9b871d2ec60e51fb.exe Key opened \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bf1ed0009a578efe9b871d2ec60e51fb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ycdwx = "C:\\Users\\Admin\\AppData\\Roaming\\Ycdwx\\Ycdwx.exe" bf1ed0009a578efe9b871d2ec60e51fb.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.ipify.org 28 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3212 set thread context of 772 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 772 bf1ed0009a578efe9b871d2ec60e51fb.exe 772 bf1ed0009a578efe9b871d2ec60e51fb.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 772 bf1ed0009a578efe9b871d2ec60e51fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3212 wrote to memory of 772 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe 86 PID 3212 wrote to memory of 772 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe 86 PID 3212 wrote to memory of 772 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe 86 PID 3212 wrote to memory of 772 3212 bf1ed0009a578efe9b871d2ec60e51fb.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bf1ed0009a578efe9b871d2ec60e51fb.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bf1ed0009a578efe9b871d2ec60e51fb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf1ed0009a578efe9b871d2ec60e51fb.exe"C:\Users\Admin\AppData\Local\Temp\bf1ed0009a578efe9b871d2ec60e51fb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\bf1ed0009a578efe9b871d2ec60e51fb.exe"C:\Users\Admin\AppData\Local\Temp\bf1ed0009a578efe9b871d2ec60e51fb.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5d95069a077ab9edd0c1a3d17cc24c7ba
SHA1971c94089814bd33898088132197efe7f05315a1
SHA256a37abbb4c91fc5f974f095736630cda418193b82caa1f4f75389bf855257c701
SHA51213ec88054cea3081b0aaf0134d191a0a9bf484fc81ca96800a09835733c869f65d2c5e524471fb9a4e74b7a73b81cfe845fb4ab490c60c3a79254a371233614c