Analysis

  • max time kernel
    112s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    07-07-2020 09:09

General

  • Target

    RFQ NO#772020_pdf.scr

  • Size

    868KB

  • MD5

    c998ca0af99e7849f3d3e869dbf7e6b8

  • SHA1

    77fd85e5e95c08c5c2c0e9385c684e71aeddbeae

  • SHA256

    56eede61d2d4522f0364d57abe131f1067498d3a7df2cf341dffb7993c662b3a

  • SHA512

    463048f373a31a74afac83ba59d152b43d626ae9e7d79c68637901313452dd58d2516fb26cf9e3986e7c7589af418b8779ab4edb0ab36ee864811b5c3a78d3d0

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ NO#772020_pdf.scr
    "C:\Users\Admin\AppData\Local\Temp\RFQ NO#772020_pdf.scr" /S
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IYJaUsaI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp80F1.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp80F1.tmp

    MD5

    32312e631f7ae8ee3647003e0c3505f3

    SHA1

    62bd44b821f8c9cff951a4d8a89a57fb58dbff10

    SHA256

    66fa0592fdb6378b3bb82947794606f6c5c324a630bf82e01ededa9f42f6b126

    SHA512

    66616d8edb15feda761e1f9044360fb47c221c54b31a2eb079f3720e7fe1fa9b46bd7f10ba882f0b9ca6d6dc934ddbf94b45d5e7a4a2e25dc530516cba529333

  • memory/1860-0-0x0000000000000000-mapping.dmp