Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2023 11:24

General

  • Target

    Account Statement 4th December 2023.exe

  • Size

    477KB

  • MD5

    38e85567ecbe691d6319179e8e42fab2

  • SHA1

    72f8f419447da72e61518a7ecdf433a4b05aa458

  • SHA256

    188b48895639573a36270e0693569d98f7a673c975478927559c3eadd6d83839

  • SHA512

    78c77591b9e381d9b3bf962693ec00f0ae94cadee813837095d4fb1e16282a93791d03a4323a52e57870632d7e09227cba1baaeee164264fb174e64a5d7c5d75

  • SSDEEP

    12288:xkNqHWr7yJzMij4kfciX/wtf7FPEvPDvmtj9yx:xUq+IIefziB8vKjQx

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Account Statement 4th December 2023.exe
    "C:\Users\Admin\AppData\Local\Temp\Account Statement 4th December 2023.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe
      "C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe
        "C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bktgubujiw.t

    Filesize

    335KB

    MD5

    03a408bbf961a94b9448aad8fed24336

    SHA1

    df08dc867912e252d48d23d599e21a0c90f3d914

    SHA256

    3d1155039ceb52969ebb93595ee5d3e2899ef72d98619c86439edd7a91d7d248

    SHA512

    69d145792d23e45419e3070c73d410506aab6ebc091c1ab70320b92f10c1b2aca5795d70e8213458e990c4be3b3d50a98675b647a51e98c626c064bcb5944643

  • C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • C:\Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • \Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • \Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • \Users\Admin\AppData\Local\Temp\cpngrtzp.exe

    Filesize

    287KB

    MD5

    ccac95bbd8877f49efc523f125489bb1

    SHA1

    92ee3a54136bded5f1c17d25fdbb553caf2eb3aa

    SHA256

    2025846378bd3d25c2c9d16e2132870ae30372cc8f51c330c07c36c47f6b2b6f

    SHA512

    bc0f73899bbb8774e3fea93803be7d0b5db2074bc5fc4c704b8d877ac4612dee42199a5d5104155f3db4847aa50b253adfa93dde062747d9b5825baf5be42a3f

  • memory/1520-10-0x0000000000720000-0x0000000000820000-memory.dmp

    Filesize

    1024KB

  • memory/2812-14-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2812-17-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2812-18-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2812-20-0x0000000073B70000-0x000000007425E000-memory.dmp

    Filesize

    6.9MB

  • memory/2812-19-0x0000000000960000-0x00000000009A2000-memory.dmp

    Filesize

    264KB

  • memory/2812-22-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/2812-21-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB

  • memory/2812-23-0x0000000073B70000-0x000000007425E000-memory.dmp

    Filesize

    6.9MB

  • memory/2812-24-0x00000000048C0000-0x0000000004900000-memory.dmp

    Filesize

    256KB