Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
09-12-2023 02:01
Static task
static1
Behavioral task
behavioral1
Sample
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
Resource
win10v2004-20231201-en
General
-
Target
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
-
Size
587KB
-
MD5
62bcb2a5e85045733c1317675ede5529
-
SHA1
07f5e3a4d0ae03182b7553d1bb5af738624745d7
-
SHA256
3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb
-
SHA512
25904446bfa10fb0c5194250d71c86a6045f5ed1f3882d224b1933644d8e09ddbaec773fb890c298edb527c778ec7f538d021691475dfae6b0b0846eaf43329f
-
SSDEEP
12288:GxPgUrdBpK8vNhdyzpeG6MqgsrUWaCX0uvSGF:Ov/vNhMqd/Sk
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2232 wuunph.exe 2148 wuunph.exe -
Loads dropped DLL 3 IoCs
pid Process 2196 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 2196 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 2232 wuunph.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2185821622-4133679102-1697169727-1000\Software\Microsoft\Windows\CurrentVersion\Run\SzvWIzD = "C:\\Users\\Admin\\AppData\\Roaming\\SzvWIzD\\SzvWIzD.exe" wuunph.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2148 2232 wuunph.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 wuunph.exe 2148 wuunph.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2232 wuunph.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 wuunph.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2232 2196 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 28 PID 2196 wrote to memory of 2232 2196 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 28 PID 2196 wrote to memory of 2232 2196 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 28 PID 2196 wrote to memory of 2232 2196 3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe 28 PID 2232 wrote to memory of 2148 2232 wuunph.exe 30 PID 2232 wrote to memory of 2148 2232 wuunph.exe 30 PID 2232 wrote to memory of 2148 2232 wuunph.exe 30 PID 2232 wrote to memory of 2148 2232 wuunph.exe 30 PID 2232 wrote to memory of 2148 2232 wuunph.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe"C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\wuunph.exe"C:\Users\Admin\AppData\Local\Temp\wuunph.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\wuunph.exe"C:\Users\Admin\AppData\Local\Temp\wuunph.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5877bf4e9e89867a4575ab7902cfa9a49
SHA1df44806b67a3f53082830984b943af6d2018534c
SHA256c5c321357cb57e62b31bfadd7af993e70e6d703cda9bbdc51d1f83d94f918449
SHA512a3929847a5a162d86135313f694778ec6b6702c884364c8cfa08759b435d31423a9b54ff3d091ba5f1eb3995f79d506f29f6b0fd6c26478a8f7339659d130d1c
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf
-
Filesize
165KB
MD53719215e4a123684f9279e9ecb819271
SHA1b7ce71263a7d0cabc0a75dde908fdb61415be786
SHA25647dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21
SHA512119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf