Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 02:24

General

  • Target

    1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

  • Size

    2.2MB

  • MD5

    07a27ce678e07245f97aea3ef3310005

  • SHA1

    475db932ef060ac59584b1130521ed0990c5a631

  • SHA256

    1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651

  • SHA512

    3aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e

  • SSDEEP

    49152:knsHyjtk2MYC5GDsHMxAJ4GIMqyBqYKhSVffgs54ouLwc:knsmtk2akxAJ4oqYLKhSlj2ouLwc

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
    "C:\Users\Admin\AppData\Local\Temp\1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"
        3⤵
        • Executes dropped EXE
        PID:4776
      • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3436
        • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe"
          4⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5068
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3036
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3012
          • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe"
            5⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.2MB

    MD5

    07a27ce678e07245f97aea3ef3310005

    SHA1

    475db932ef060ac59584b1130521ed0990c5a631

    SHA256

    1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651

    SHA512

    3aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.2MB

    MD5

    07a27ce678e07245f97aea3ef3310005

    SHA1

    475db932ef060ac59584b1130521ed0990c5a631

    SHA256

    1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651

    SHA512

    3aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    2.2MB

    MD5

    07a27ce678e07245f97aea3ef3310005

    SHA1

    475db932ef060ac59584b1130521ed0990c5a631

    SHA256

    1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651

    SHA512

    3aa52830da5696f170c50d6359ebd222858ef1579e3aae4f78fd8c7705f8a351dad09918261a230e834894502a1bf2339d616d4546bc0f35571bdb82523aa60e

  • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    237KB

    MD5

    60b60c0077424578115f6075c88aaf7e

    SHA1

    78c633a8530623a234bc9faed0af8c5a61dd2589

    SHA256

    8bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d

    SHA512

    33f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a

  • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    237KB

    MD5

    60b60c0077424578115f6075c88aaf7e

    SHA1

    78c633a8530623a234bc9faed0af8c5a61dd2589

    SHA256

    8bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d

    SHA512

    33f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a

  • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe

    Filesize

    237KB

    MD5

    60b60c0077424578115f6075c88aaf7e

    SHA1

    78c633a8530623a234bc9faed0af8c5a61dd2589

    SHA256

    8bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d

    SHA512

    33f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a

  • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe

    Filesize

    237KB

    MD5

    60b60c0077424578115f6075c88aaf7e

    SHA1

    78c633a8530623a234bc9faed0af8c5a61dd2589

    SHA256

    8bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d

    SHA512

    33f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a

  • C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe

    Filesize

    237KB

    MD5

    60b60c0077424578115f6075c88aaf7e

    SHA1

    78c633a8530623a234bc9faed0af8c5a61dd2589

    SHA256

    8bbbcf41316eec589be4a7486747afaaec42b81f5689364d0fa30f48cf30ce2d

    SHA512

    33f2f34e46887561158298a176795f684584d29e7152c420e2bf59d1a374768733c0d020cf0485b011b4b7f360c38ecc217dd4287ff407cb871fe4690b35686a

  • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_1c71c9a1f55df1eaa11402798696fa7176155fabad5f69f8778d340a911d2651.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    1.4MB

    MD5

    1aaccaee804f247a9efed42cbaae20f6

    SHA1

    e8a5d53efee26fc2c74a9528da4c5c99d4212774

    SHA256

    53ebb238d7c9809ec82717cf4ef688139a3dff8899614e3eca67f3f7defeb79b

    SHA512

    2abdc35db0fb21ba195db30d289d604fd59ba14513d33666fed01d4c5085a22915de358837f056e2f89a23f01e946a4b7cebc7d7b534268a071b5c897e088b18

  • memory/2024-0-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/2024-128-0x0000000000400000-0x000000000062F000-memory.dmp

    Filesize

    2.2MB

  • memory/3012-211-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3012-348-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3012-223-0x00000000014A0000-0x00000000014A1000-memory.dmp

    Filesize

    4KB

  • memory/3012-220-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3012-217-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3012-213-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3036-194-0x0000000001610000-0x0000000001620000-memory.dmp

    Filesize

    64KB

  • memory/3036-198-0x0000000005B30000-0x0000000005B42000-memory.dmp

    Filesize

    72KB

  • memory/3036-209-0x0000000005B70000-0x0000000005B7C000-memory.dmp

    Filesize

    48KB

  • memory/3036-193-0x00000000722F0000-0x0000000072AA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3036-210-0x0000000007470000-0x00000000075A8000-memory.dmp

    Filesize

    1.2MB

  • memory/3036-204-0x00000000722F0000-0x0000000072AA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3036-205-0x0000000001610000-0x0000000001620000-memory.dmp

    Filesize

    64KB

  • memory/3036-196-0x0000000005A20000-0x0000000005AB2000-memory.dmp

    Filesize

    584KB

  • memory/3036-195-0x0000000005FD0000-0x0000000006574000-memory.dmp

    Filesize

    5.6MB

  • memory/3036-226-0x00000000722F0000-0x0000000072AA0000-memory.dmp

    Filesize

    7.7MB

  • memory/3436-227-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3436-349-0x0000000000400000-0x00000000004FE000-memory.dmp

    Filesize

    1016KB

  • memory/3436-230-0x0000000002C40000-0x0000000002C41000-memory.dmp

    Filesize

    4KB

  • memory/3588-199-0x0000000000400000-0x000000000062F000-memory.dmp

    Filesize

    2.2MB

  • memory/3588-133-0x00000000007E0000-0x00000000007E1000-memory.dmp

    Filesize

    4KB

  • memory/3588-202-0x00000000007E0000-0x00000000007E1000-memory.dmp

    Filesize

    4KB

  • memory/3588-379-0x0000000000400000-0x000000000062F000-memory.dmp

    Filesize

    2.2MB

  • memory/4036-355-0x0000000005350000-0x0000000005360000-memory.dmp

    Filesize

    64KB

  • memory/4036-377-0x00000000731F0000-0x00000000739A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4036-380-0x0000000005350000-0x0000000005360000-memory.dmp

    Filesize

    64KB

  • memory/4036-352-0x00000000731F0000-0x00000000739A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4584-182-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-197-0x0000000005B60000-0x0000000005BFC000-memory.dmp

    Filesize

    624KB

  • memory/4584-231-0x00000000722F0000-0x0000000072AA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4584-200-0x00000000722F0000-0x0000000072AA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4584-130-0x00000000722F0000-0x0000000072AA0000-memory.dmp

    Filesize

    7.7MB

  • memory/4584-129-0x0000000000D10000-0x0000000000E82000-memory.dmp

    Filesize

    1.4MB

  • memory/4584-208-0x0000000005B50000-0x0000000005B5A000-memory.dmp

    Filesize

    40KB

  • memory/4584-203-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/5068-350-0x00000000731F0000-0x00000000739A0000-memory.dmp

    Filesize

    7.7MB

  • memory/5068-356-0x0000000006E70000-0x0000000006EC0000-memory.dmp

    Filesize

    320KB

  • memory/5068-358-0x0000000006EE0000-0x0000000006EEA000-memory.dmp

    Filesize

    40KB

  • memory/5068-376-0x00000000731F0000-0x00000000739A0000-memory.dmp

    Filesize

    7.7MB

  • memory/5068-354-0x00000000057C0000-0x0000000005826000-memory.dmp

    Filesize

    408KB

  • memory/5068-378-0x00000000059A0000-0x00000000059B0000-memory.dmp

    Filesize

    64KB

  • memory/5068-353-0x00000000059A0000-0x00000000059B0000-memory.dmp

    Filesize

    64KB

  • memory/5068-351-0x0000000000DA0000-0x0000000000DE2000-memory.dmp

    Filesize

    264KB