Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11-12-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe
Resource
win10v2004-20231127-en
General
-
Target
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe
-
Size
587KB
-
MD5
ce62a9d0c996178c2ac6a7b9a652257e
-
SHA1
a8b4df6d25572780e70d10f64a5f7cda95180bd4
-
SHA256
8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976
-
SHA512
a9cebf2750e1da9cae45825212c2189fe25cb6194c0b2ca564185f44514ba71f01adc9e6181acd56c8b355e2ebe6f0d34a133fed9e7af1b8f7fa3ba88a8d0520
-
SSDEEP
12288:KxPgUrz/QxsOiVSXGNmMyR+llVu07GOjmnmvHV:qh4ZiVS2NmIuO4mvV
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2484 tmtuht.exe 2244 tmtuht.exe -
Loads dropped DLL 3 IoCs
pid Process 2488 8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe 2488 8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe 2484 tmtuht.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\SzvWIzD = "C:\\Users\\Admin\\AppData\\Roaming\\SzvWIzD\\SzvWIzD.exe" tmtuht.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2484 set thread context of 2244 2484 tmtuht.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 tmtuht.exe 2244 tmtuht.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2484 tmtuht.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2244 tmtuht.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2484 2488 8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe 28 PID 2488 wrote to memory of 2484 2488 8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe 28 PID 2488 wrote to memory of 2484 2488 8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe 28 PID 2488 wrote to memory of 2484 2488 8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe 28 PID 2484 wrote to memory of 2244 2484 tmtuht.exe 30 PID 2484 wrote to memory of 2244 2484 tmtuht.exe 30 PID 2484 wrote to memory of 2244 2484 tmtuht.exe 30 PID 2484 wrote to memory of 2244 2484 tmtuht.exe 30 PID 2484 wrote to memory of 2244 2484 tmtuht.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe"C:\Users\Admin\AppData\Local\Temp\8443db8f13ee9852c43c33605e22104d3ea320276f2affff0534627076c52976.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\tmtuht.exe"C:\Users\Admin\AppData\Local\Temp\tmtuht.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\tmtuht.exe"C:\Users\Admin\AppData\Local\Temp\tmtuht.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5b984c359bab693eb3c6c133db0777c37
SHA1ba8a80bb8cf2495a5714a8b9d4e215e3f136a276
SHA2560731011a5247799b0b016b1bdde41d635f8475251063dc1300de3bbbe93cc2a6
SHA512259958da5b33a49c6f54608b37d8b163c8aa6dc02081ff2b2edc9ac01fa97c963bed0d95360ac4a9a5cb6d78c46243e360d5ef589b54409520f5a89e991eac66
-
Filesize
165KB
MD501510af00c29e6f934350883c257a786
SHA1ca506e7993ec5c526525d3aa99f688431a337225
SHA256a8ca422e55514a9e08501f028abce1039b23e50836a97cde34b8508cebc20a91
SHA512a14c18607235c4166ec2349c6fca741deaf4cd9591ce216d77f96d69c5d0a2638937932a2dc04874972845545a27250dded00a411a045bc1d1a540adce70d41f