Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 01:12
Static task
static1
Behavioral task
behavioral1
Sample
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
Resource
win10v2004-20231201-en
General
-
Target
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe
-
Size
422KB
-
MD5
50541c2cd38eed9db2a65faa10fdc877
-
SHA1
432affdf4626871c032cdb0d0432c9c91897df5b
-
SHA256
27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7
-
SHA512
e8ece503b2e96f314b9e480396a93cc3e6af2141488ed92e8bd76c75d6b3a5263ae57b28a09f87847aef238538c0b532eed833d1fdd0dc974cf7fdb6c408d96d
-
SSDEEP
6144:P8LxBgQA9EWGEbktNxLahPW9DOzyAoXYwNF6dGtGW62WYFbNAKw6kOMw:gAVfbMNx+ZhyAoXNievWmvrMw
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 1404 uzqlnsntz.exe 1980 uzqlnsntz.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe 1404 uzqlnsntz.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 1980 1404 uzqlnsntz.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 uzqlnsntz.exe 1980 uzqlnsntz.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1404 uzqlnsntz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 uzqlnsntz.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1404 2868 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe 28 PID 2868 wrote to memory of 1404 2868 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe 28 PID 2868 wrote to memory of 1404 2868 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe 28 PID 2868 wrote to memory of 1404 2868 27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe 28 PID 1404 wrote to memory of 1980 1404 uzqlnsntz.exe 29 PID 1404 wrote to memory of 1980 1404 uzqlnsntz.exe 29 PID 1404 wrote to memory of 1980 1404 uzqlnsntz.exe 29 PID 1404 wrote to memory of 1980 1404 uzqlnsntz.exe 29 PID 1404 wrote to memory of 1980 1404 uzqlnsntz.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe"C:\Users\Admin\AppData\Local\Temp\27e45037b1b654116d2b38935319922820388546c717ace1223236fe37740ee7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"C:\Users\Admin\AppData\Local\Temp\uzqlnsntz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5ebc1fae6e8f6d444d9680e694db83f04
SHA194b0aa53a92eb358ac7ae597b8a505c334af5cd3
SHA2561338136538526c0d93b51a6085e1dba6a741c32c6cf4322c48f6d78ff5dcfb6a
SHA51264c8b17241d76d0ee81da3c77b4f04f1af28be31426b14140824957834f047c90dba4fd5d287b1d467eaab7ad2e3655ffce4ef1fa8562e6f2f6c5dfe62882c6b
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454
-
Filesize
174KB
MD5414ba01a5a8be61ea11f33c49f249a96
SHA1feddcbee54dfad2b95726322814f3abf0015285a
SHA2563b5fdd55bb5f0beaeb6343735cb4a17f7c0ad994c78b0ed07de21c20a2debfcd
SHA512f599bd6edb94bf7b6b0bcb94660bc382b857834757303c9afc80bd61bbaa06ff71c586a90e5357a29d29c38b3c932710d4c9afb6b686485783e34480f228e454