Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 02:29
Static task
static1
Behavioral task
behavioral1
Sample
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
Resource
win10v2004-20231130-en
General
-
Target
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe
-
Size
363KB
-
MD5
6efb6ff87f5d89884d54bec7292175cf
-
SHA1
22059d226717ac0d3939856d0dfa96d227d4f2f7
-
SHA256
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f
-
SHA512
81af67219a0d32e45988d406a9faef65bbfbc816514d80867c57855fa286ecbcb86c9c1cc8730dc2be46f8e9ebd044102adf54cc5fef2d30efc0536701bb623c
-
SSDEEP
6144:3BlL/MvvVjdK0lJ5YqTkc1pEMkvIMFRnsEBkWqFFs7SqEsZc6/e5jbXyAGAu:xavtpKQhwiuMkrfkP07zO6/eF+eu
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
Processes:
sxuojeerk.exesxuojeerk.exepid process 1980 sxuojeerk.exe 2684 sxuojeerk.exe -
Loads dropped DLL 3 IoCs
Processes:
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exesxuojeerk.exepid process 1552 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe 1552 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe 1980 sxuojeerk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sxuojeerk.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\FdnCz = "C:\\Users\\Admin\\AppData\\Roaming\\FdnCz\\FdnCz.exe" sxuojeerk.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sxuojeerk.exedescription pid process target process PID 1980 set thread context of 2684 1980 sxuojeerk.exe sxuojeerk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
sxuojeerk.exepid process 2684 sxuojeerk.exe 2684 sxuojeerk.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
sxuojeerk.exepid process 1980 sxuojeerk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sxuojeerk.exedescription pid process Token: SeDebugPrivilege 2684 sxuojeerk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
sxuojeerk.exepid process 2684 sxuojeerk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exesxuojeerk.exedescription pid process target process PID 1552 wrote to memory of 1980 1552 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 1552 wrote to memory of 1980 1552 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 1552 wrote to memory of 1980 1552 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 1552 wrote to memory of 1980 1552 1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe sxuojeerk.exe PID 1980 wrote to memory of 2684 1980 sxuojeerk.exe sxuojeerk.exe PID 1980 wrote to memory of 2684 1980 sxuojeerk.exe sxuojeerk.exe PID 1980 wrote to memory of 2684 1980 sxuojeerk.exe sxuojeerk.exe PID 1980 wrote to memory of 2684 1980 sxuojeerk.exe sxuojeerk.exe PID 1980 wrote to memory of 2684 1980 sxuojeerk.exe sxuojeerk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe"C:\Users\Admin\AppData\Local\Temp\1c5fe765bf3ebb0796a13fcfd22c3b9a92b55e2734b1de8904a8e8f8931f350f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"C:\Users\Admin\AppData\Local\Temp\sxuojeerk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5e1856a3cb40a5605ad36b4ae37dfe37a
SHA1b0fa5b73764df7a6c79802ac954e28d31f9512d1
SHA256894a723c45dfff46803c4aff233cdad0b2494fbe5ee2249ddc3186e92bda3bea
SHA51267960b4c618df794ac020c9be089c0efc5c292b089dad36bc8e11faba72990d7239fee335485cc3ce6d16590639403275a0c3ca6e72c202033a8d1d0ed113996
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a
-
Filesize
178KB
MD5ee5d6845f2d916386c0b653d46bc82d5
SHA1adcf833083c0aaff86644f43bd1f95fa1b48f6fb
SHA2565930c69d2a0bee02e324b1e6b0dfb061553af1c3bee62e2a56ffa52d4c2001e3
SHA5124c8d62eb9e12ea37ab43115a94e953d8c8343f9aa4581e8c0856e152f416dc50b9cf6b2d76b7e579dd3f5a5c84b5492e9f179e995421b808b9e5acc44757e14a