Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 02:56
Static task
static1
Behavioral task
behavioral1
Sample
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe
Resource
win10v2004-20231127-en
General
-
Target
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe
-
Size
409KB
-
MD5
b29dbf6781cc7efeeabe34da55265457
-
SHA1
b6987d4fd67071ed835a00f290ebe1afb31deca7
-
SHA256
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a
-
SHA512
6324cc3e9645ad90a6ebf1a21de200a769f1e3bb3987e13241ca9bc8578c9812f68747d06b0ef7a2e95d8d174e9f72c409ad91313db04874d4c5779da4a2719b
-
SSDEEP
12288:Dqp2AAmJGMxHKuvrKYEI/GaAnZ5gJiTSWnwWoXah3H:DzXbM9vrKW/GaAnMIT3wWoi3H
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2056 euwzc.exe 2872 euwzc.exe -
Loads dropped DLL 3 IoCs
pid Process 1516 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 1516 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 2056 euwzc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\uenjsoxhdmvqa = "C:\\Users\\Admin\\AppData\\Roaming\\dirmv\\fbkgpy.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\euwzc.exe\" " euwzc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\qLYhCbk = "C:\\Users\\Admin\\AppData\\Roaming\\qLYhCbk\\qLYhCbk.exe" euwzc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2056 set thread context of 2872 2056 euwzc.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2872 euwzc.exe 2872 euwzc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2056 euwzc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 euwzc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2056 1516 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 28 PID 1516 wrote to memory of 2056 1516 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 28 PID 1516 wrote to memory of 2056 1516 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 28 PID 1516 wrote to memory of 2056 1516 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 28 PID 2056 wrote to memory of 2872 2056 euwzc.exe 29 PID 2056 wrote to memory of 2872 2056 euwzc.exe 29 PID 2056 wrote to memory of 2872 2056 euwzc.exe 29 PID 2056 wrote to memory of 2872 2056 euwzc.exe 29 PID 2056 wrote to memory of 2872 2056 euwzc.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe"C:\Users\Admin\AppData\Local\Temp\fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\euwzc.exe"C:\Users\Admin\AppData\Local\Temp\euwzc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\euwzc.exe"C:\Users\Admin\AppData\Local\Temp\euwzc.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
337KB
MD52c7afc57a1cf74392a8d01af09111150
SHA105066db44716186393911567229f3af94e2be627
SHA256920aca85aa348d9f82b7749a034ff35e2b623f2c828cfe93079bfb458140e73e
SHA512a5a5f29f8560294bb07caeeccfe340d09624264a4e509c79ec0955de9da62bb9577deb38de97499c2fe6498bca69d386c5171372b0a05122b1e6d3c0f4b7b999
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03