Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2023, 11:39

General

  • Target

    7fc12805bd6af1082f3689b424eb3f4c_JC.exe

  • Size

    392KB

  • MD5

    7fc12805bd6af1082f3689b424eb3f4c

  • SHA1

    0c73883df2e3b131ff6952c2e6088df69e4876db

  • SHA256

    bef28d599ab34506504a92f84c6bdeb2c0cadb3d8aae2ccfe2636c34f2052a2b

  • SHA512

    6c041dfddf2257dad27114b53f89de285ed64658e0e63293887788c753ae0cdacfee9cd86959e5ff6c8098d4bf33077d6765134f18fdcf7c3db8d34c311364c8

  • SSDEEP

    6144:2Ya6yXMMW+gPDDpn3gkvaSJOcXIG88SJbu5wNrb0fPr17sIhExLExN1x:2YkrWzDDxQMvgbRJqCRg7ElExJ

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fc12805bd6af1082f3689b424eb3f4c_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7fc12805bd6af1082f3689b424eb3f4c_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe
      "C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe
        "C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • C:\Users\Admin\AppData\Local\Temp\xtqqqovdsr.g

    Filesize

    336KB

    MD5

    833a7b5f305f32b7efbbafaa7c026e61

    SHA1

    e0df593c9f57f3cd23098e16b25a31d8cb2c6a70

    SHA256

    bf0c140bcffc4cc34853920e3f4be1f64833748cff15050a8d2f66d6aefb84e3

    SHA512

    4668e8f9164f874bf224ffc92d9b70fa8b4debced4c7493fd95deb70e7aba3c8261f43cb6fed96546bbd9fe433c34e59a592f377190f3fd41106a3180d0d40a8

  • \Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • \Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • \Users\Admin\AppData\Local\Temp\wtmnjqxo.exe

    Filesize

    148KB

    MD5

    2b88abcb55acd16e78daee6ecf6440fc

    SHA1

    e7e7b48df23715d6208fd8416199d42a33a6d8f7

    SHA256

    0a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f

    SHA512

    5a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c

  • memory/2268-9-0x0000000000200000-0x0000000000202000-memory.dmp

    Filesize

    8KB

  • memory/2628-13-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2628-16-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2628-18-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2628-19-0x0000000073A00000-0x00000000740EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2628-20-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/2628-21-0x0000000000460000-0x00000000004A2000-memory.dmp

    Filesize

    264KB

  • memory/2628-22-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/2628-23-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/2628-24-0x0000000002030000-0x0000000002070000-memory.dmp

    Filesize

    256KB

  • memory/2628-25-0x0000000073A00000-0x00000000740EE000-memory.dmp

    Filesize

    6.9MB