Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 02:21
Static task
static1
Behavioral task
behavioral1
Sample
a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe
Resource
win10v2004-20231127-en
General
-
Target
a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe
-
Size
406KB
-
MD5
bd36049cff41be20392da7c3d5279b98
-
SHA1
cd3f09d3273d60aa03a127e99f37c1c73b086e97
-
SHA256
a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3
-
SHA512
1174e503416ca3d0fc0711c1eb68e53249600cbf52d5b5e9b53448c9bd266edd9e5bb998ee975b24341e0fc577445d40868dfb44dbcd77b66eb4f5f4f43073d0
-
SSDEEP
12288:Dn0SBro//EWZys11TLMKrLqfhkQHf4e7Kj:DNro/ckNzPMyqfhz4e7a
Malware Config
Extracted
Protocol: smtp- Host:
mail.karthikagro.in - Port:
587 - Username:
[email protected] - Password:
Yenks@0910
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 4452 mzhxcbw.exe 3480 mzhxcbw.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LHdEfz = "C:\\Users\\Admin\\AppData\\Roaming\\LHdEfz\\LHdEfz.exe" mzhxcbw.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 api.ipify.org 44 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4452 set thread context of 3480 4452 mzhxcbw.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3480 mzhxcbw.exe 3480 mzhxcbw.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4452 mzhxcbw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3480 mzhxcbw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3480 mzhxcbw.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4452 2940 a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe 91 PID 2940 wrote to memory of 4452 2940 a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe 91 PID 2940 wrote to memory of 4452 2940 a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe 91 PID 4452 wrote to memory of 3480 4452 mzhxcbw.exe 92 PID 4452 wrote to memory of 3480 4452 mzhxcbw.exe 92 PID 4452 wrote to memory of 3480 4452 mzhxcbw.exe 92 PID 4452 wrote to memory of 3480 4452 mzhxcbw.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe"C:\Users\Admin\AppData\Local\Temp\a9820550522d6a148ac068caf435027f2a9c7480021b8f54730aba998e28ffd3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\mzhxcbw.exe"C:\Users\Admin\AppData\Local\Temp\mzhxcbw.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\mzhxcbw.exe"C:\Users\Admin\AppData\Local\Temp\mzhxcbw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD570a1ce678280758e42b3ec7018648bce
SHA140de991e1b7eea6919f34c6b0d3af44d04d0a8bb
SHA2562886fd36add64512255f48a6890e07873b4cb9a26810b0ff4ff4edfdf1446cb3
SHA512a3ed8647c6fcc9427b0777e802a3b495c118785092b8b7dda56b5f6de3f6168c8b9d6a0886e304fcae314c15c905be61ce5f382ed8cdacc2d650db3222517383
-
Filesize
167KB
MD570a1ce678280758e42b3ec7018648bce
SHA140de991e1b7eea6919f34c6b0d3af44d04d0a8bb
SHA2562886fd36add64512255f48a6890e07873b4cb9a26810b0ff4ff4edfdf1446cb3
SHA512a3ed8647c6fcc9427b0777e802a3b495c118785092b8b7dda56b5f6de3f6168c8b9d6a0886e304fcae314c15c905be61ce5f382ed8cdacc2d650db3222517383
-
Filesize
167KB
MD570a1ce678280758e42b3ec7018648bce
SHA140de991e1b7eea6919f34c6b0d3af44d04d0a8bb
SHA2562886fd36add64512255f48a6890e07873b4cb9a26810b0ff4ff4edfdf1446cb3
SHA512a3ed8647c6fcc9427b0777e802a3b495c118785092b8b7dda56b5f6de3f6168c8b9d6a0886e304fcae314c15c905be61ce5f382ed8cdacc2d650db3222517383
-
Filesize
335KB
MD5f1599514ab1aa9828f2b6889e1b10ac6
SHA1787c41364405afd05d17dc0c8ac406a4c6ca205f
SHA2563aea5bece72ee8e233cc492d6d972ddba1cc53048a7e8df6b4c2769d156a68ea
SHA5125f26fda538e8fe3c9e957a587becb753d3127e1233c3fcc9372cb18924bffbdce28a4ca79dd7e6aa82eaabeb9a371a7e966898ee2b42c48a273f328baabde822