Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 02:56
Static task
static1
Behavioral task
behavioral1
Sample
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe
Resource
win10v2004-20231127-en
General
-
Target
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe
-
Size
409KB
-
MD5
b29dbf6781cc7efeeabe34da55265457
-
SHA1
b6987d4fd67071ed835a00f290ebe1afb31deca7
-
SHA256
fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a
-
SHA512
6324cc3e9645ad90a6ebf1a21de200a769f1e3bb3987e13241ca9bc8578c9812f68747d06b0ef7a2e95d8d174e9f72c409ad91313db04874d4c5779da4a2719b
-
SSDEEP
12288:Dqp2AAmJGMxHKuvrKYEI/GaAnZ5gJiTSWnwWoXah3H:DzXbM9vrKW/GaAnMIT3wWoi3H
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 4044 euwzc.exe 1876 euwzc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uenjsoxhdmvqa = "C:\\Users\\Admin\\AppData\\Roaming\\dirmv\\fbkgpy.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\euwzc.exe\" " euwzc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qLYhCbk = "C:\\Users\\Admin\\AppData\\Roaming\\qLYhCbk\\qLYhCbk.exe" euwzc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 api.ipify.org 40 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4044 set thread context of 1876 4044 euwzc.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1876 euwzc.exe 1876 euwzc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4044 euwzc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1876 euwzc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4044 2288 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 88 PID 2288 wrote to memory of 4044 2288 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 88 PID 2288 wrote to memory of 4044 2288 fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe 88 PID 4044 wrote to memory of 1876 4044 euwzc.exe 90 PID 4044 wrote to memory of 1876 4044 euwzc.exe 90 PID 4044 wrote to memory of 1876 4044 euwzc.exe 90 PID 4044 wrote to memory of 1876 4044 euwzc.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3028534956-1709433221-1313273668-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 euwzc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe"C:\Users\Admin\AppData\Local\Temp\fdfbc9e5ae70e2e3b7be7e90ab1708831d822bbb1887372bf6194713785b460a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\euwzc.exe"C:\Users\Admin\AppData\Local\Temp\euwzc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\euwzc.exe"C:\Users\Admin\AppData\Local\Temp\euwzc.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
166KB
MD50c11571e80cd85eb7635bcaea51e8cca
SHA12d84d9a80c2b48b64edbc47465e2ef355fb51f7d
SHA256e0ec22eb21575373bb380e961fc29bf85d1c09e5a0d0397bcc8a4a72d83ad9e8
SHA512a02134124b00a13fbb138bc97b3e738389b5c914d8adcff774eef80c5fb7651e04860ee84a00b4d4263e3f455b2fefc851eb0e55c2ece21654bee388585cfd03
-
Filesize
337KB
MD52c7afc57a1cf74392a8d01af09111150
SHA105066db44716186393911567229f3af94e2be627
SHA256920aca85aa348d9f82b7749a034ff35e2b623f2c828cfe93079bfb458140e73e
SHA512a5a5f29f8560294bb07caeeccfe340d09624264a4e509c79ec0955de9da62bb9577deb38de97499c2fe6498bca69d386c5171372b0a05122b1e6d3c0f4b7b999