Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2023 02:01

General

  • Target

    3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe

  • Size

    587KB

  • MD5

    62bcb2a5e85045733c1317675ede5529

  • SHA1

    07f5e3a4d0ae03182b7553d1bb5af738624745d7

  • SHA256

    3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb

  • SHA512

    25904446bfa10fb0c5194250d71c86a6045f5ed1f3882d224b1933644d8e09ddbaec773fb890c298edb527c778ec7f538d021691475dfae6b0b0846eaf43329f

  • SSDEEP

    12288:GxPgUrdBpK8vNhdyzpeG6MqgsrUWaCX0uvSGF:Ov/vNhMqd/Sk

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe
    "C:\Users\Admin\AppData\Local\Temp\3b8974abc5bd12b5dc5c5438f83f262ba8c4c01efcee9a95932d98b8817a35cb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\wuunph.exe
      "C:\Users\Admin\AppData\Local\Temp\wuunph.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Users\Admin\AppData\Local\Temp\wuunph.exe
        "C:\Users\Admin\AppData\Local\Temp\wuunph.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eopgkekszvm.d

    Filesize

    333KB

    MD5

    877bf4e9e89867a4575ab7902cfa9a49

    SHA1

    df44806b67a3f53082830984b943af6d2018534c

    SHA256

    c5c321357cb57e62b31bfadd7af993e70e6d703cda9bbdc51d1f83d94f918449

    SHA512

    a3929847a5a162d86135313f694778ec6b6702c884364c8cfa08759b435d31423a9b54ff3d091ba5f1eb3995f79d506f29f6b0fd6c26478a8f7339659d130d1c

  • C:\Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • C:\Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • C:\Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • C:\Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • \Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • \Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • \Users\Admin\AppData\Local\Temp\wuunph.exe

    Filesize

    165KB

    MD5

    3719215e4a123684f9279e9ecb819271

    SHA1

    b7ce71263a7d0cabc0a75dde908fdb61415be786

    SHA256

    47dfb050d51dda7c6fa6a043c72c77226578c24601bd6461b668fc16222b1c21

    SHA512

    119cc552dfe4c9269206ee7ed1de8abbf8a427d431b5f31fd0c5b1340baf2e6141c64f24aff6efcd63350f86e784fe9374e85e9deed8ef5d51b60ffd6c0b16cf

  • memory/2148-18-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2148-13-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2148-17-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/2148-19-0x0000000001D50000-0x0000000001D92000-memory.dmp

    Filesize

    264KB

  • memory/2148-20-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2148-21-0x0000000001DC0000-0x0000000001E00000-memory.dmp

    Filesize

    256KB

  • memory/2148-23-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2232-15-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2232-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB