Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
7fc12805bd6af1082f3689b424eb3f4c_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7fc12805bd6af1082f3689b424eb3f4c_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
7fc12805bd6af1082f3689b424eb3f4c_JC.exe
-
Size
392KB
-
MD5
7fc12805bd6af1082f3689b424eb3f4c
-
SHA1
0c73883df2e3b131ff6952c2e6088df69e4876db
-
SHA256
bef28d599ab34506504a92f84c6bdeb2c0cadb3d8aae2ccfe2636c34f2052a2b
-
SHA512
6c041dfddf2257dad27114b53f89de285ed64658e0e63293887788c753ae0cdacfee9cd86959e5ff6c8098d4bf33077d6765134f18fdcf7c3db8d34c311364c8
-
SSDEEP
6144:2Ya6yXMMW+gPDDpn3gkvaSJOcXIG88SJbu5wNrb0fPr17sIhExLExN1x:2YkrWzDDxQMvgbRJqCRg7ElExJ
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2268 wtmnjqxo.exe 2628 wtmnjqxo.exe -
Loads dropped DLL 3 IoCs
pid Process 2264 7fc12805bd6af1082f3689b424eb3f4c_JC.exe 2264 7fc12805bd6af1082f3689b424eb3f4c_JC.exe 2268 wtmnjqxo.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wtmnjqxo.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wtmnjqxo.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wtmnjqxo.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2628 2268 wtmnjqxo.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2628 wtmnjqxo.exe 2628 wtmnjqxo.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2268 wtmnjqxo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 wtmnjqxo.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 wtmnjqxo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2268 2264 7fc12805bd6af1082f3689b424eb3f4c_JC.exe 28 PID 2264 wrote to memory of 2268 2264 7fc12805bd6af1082f3689b424eb3f4c_JC.exe 28 PID 2264 wrote to memory of 2268 2264 7fc12805bd6af1082f3689b424eb3f4c_JC.exe 28 PID 2264 wrote to memory of 2268 2264 7fc12805bd6af1082f3689b424eb3f4c_JC.exe 28 PID 2268 wrote to memory of 2628 2268 wtmnjqxo.exe 29 PID 2268 wrote to memory of 2628 2268 wtmnjqxo.exe 29 PID 2268 wrote to memory of 2628 2268 wtmnjqxo.exe 29 PID 2268 wrote to memory of 2628 2268 wtmnjqxo.exe 29 PID 2268 wrote to memory of 2628 2268 wtmnjqxo.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wtmnjqxo.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 wtmnjqxo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fc12805bd6af1082f3689b424eb3f4c_JC.exe"C:\Users\Admin\AppData\Local\Temp\7fc12805bd6af1082f3689b424eb3f4c_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe"C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe"C:\Users\Admin\AppData\Local\Temp\wtmnjqxo.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c
-
Filesize
336KB
MD5833a7b5f305f32b7efbbafaa7c026e61
SHA1e0df593c9f57f3cd23098e16b25a31d8cb2c6a70
SHA256bf0c140bcffc4cc34853920e3f4be1f64833748cff15050a8d2f66d6aefb84e3
SHA5124668e8f9164f874bf224ffc92d9b70fa8b4debced4c7493fd95deb70e7aba3c8261f43cb6fed96546bbd9fe433c34e59a592f377190f3fd41106a3180d0d40a8
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c
-
Filesize
148KB
MD52b88abcb55acd16e78daee6ecf6440fc
SHA1e7e7b48df23715d6208fd8416199d42a33a6d8f7
SHA2560a5b1e3d52aa6fdea5d310769bce80347601de22746b2b047cccbeaf9f742d0f
SHA5125a25d1320d98b61fce670d5b604397ac671134354675e175b2b4a59b74c2b8aa7e6575f16f80778065f1796191bb6f500c1201266097f94110f9ad5dc8bd2f2c