Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2023 02:29

General

  • Target

    1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe

  • Size

    363KB

  • MD5

    6efb6ff87f5d89884d54bec7292175cf

  • SHA1

    22059d226717ac0d3939856d0dfa96d227d4f2f7

  • SHA256

    1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f

  • SHA512

    81af67219a0d32e45988d406a9faef65bbfbc816514d80867c57855fa286ecbcb86c9c1cc8730dc2be46f8e9ebd044102adf54cc5fef2d30efc0536701bb623c

  • SSDEEP

    6144:3BlL/MvvVjdK0lJ5YqTkc1pEMkvIMFRnsEBkWqFFs7SqEsZc6/e5jbXyAGAu:xavtpKQhwiuMkrfkP07zO6/eF+eu

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
    "C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe
      "C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe
        "C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lxdadgl.hv

    Filesize

    334KB

    MD5

    e1856a3cb40a5605ad36b4ae37dfe37a

    SHA1

    b0fa5b73764df7a6c79802ac954e28d31f9512d1

    SHA256

    894a723c45dfff46803c4aff233cdad0b2494fbe5ee2249ddc3186e92bda3bea

    SHA512

    67960b4c618df794ac020c9be089c0efc5c292b089dad36bc8e11faba72990d7239fee335485cc3ce6d16590639403275a0c3ca6e72c202033a8d1d0ed113996

  • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • \Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • \Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • \Users\Admin\AppData\Local\Temp\sxuojeerk.exe

    Filesize

    178KB

    MD5

    ee5d6845f2d916386c0b653d46bc82d5

    SHA1

    adcf833083c0aaff86644f43bd1f95fa1b48f6fb

    SHA256

    5930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3

    SHA512

    4c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a

  • memory/1980-9-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2684-16-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2684-13-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2684-17-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2684-18-0x0000000000300000-0x0000000000342000-memory.dmp

    Filesize

    264KB

  • memory/2684-19-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-20-0x0000000004A80000-0x0000000004AC0000-memory.dmp

    Filesize

    256KB

  • memory/2684-21-0x0000000004A80000-0x0000000004AC0000-memory.dmp

    Filesize

    256KB

  • memory/2684-22-0x0000000004A80000-0x0000000004AC0000-memory.dmp

    Filesize

    256KB

  • memory/2684-23-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2684-24-0x00000000746E0000-0x0000000074DCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-25-0x0000000004A80000-0x0000000004AC0000-memory.dmp

    Filesize

    256KB

  • memory/2684-26-0x0000000004A80000-0x0000000004AC0000-memory.dmp

    Filesize

    256KB