Analysis
-
max time kernel
67s -
max time network
67s -
platform
windows7_x64 -
resource
win7 -
submitted
09-07-2020 08:33
Static task
static1
Behavioral task
behavioral1
Sample
quote120485682.exe
Resource
win7
Behavioral task
behavioral2
Sample
quote120485682.exe
Resource
win10v200430
General
-
Target
quote120485682.exe
-
Size
572KB
-
MD5
dd4e839e69d63224da693caf05e34281
-
SHA1
f8a382f169d26693f1f7d9a9c36713097e635770
-
SHA256
8cab6c0718ebfebd219f078bf3c5a7271a58c93e3f37a7a0ed1b27b91e14111b
-
SHA512
65e7fe6eacaf928555d875fcc92522a58cf5334e3f2b53fc2c63b5f82e00e35355b7363bf444a73bd00fe9c1cbb95d859664e3806dcc73934ae435d067ddf2d7
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 112 set thread context of 928 112 quote120485682.exe 24 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 928 quote120485682.exe -
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 112 wrote to memory of 928 112 quote120485682.exe 24 PID 928 wrote to memory of 1588 928 quote120485682.exe 28 PID 928 wrote to memory of 1588 928 quote120485682.exe 28 PID 928 wrote to memory of 1588 928 quote120485682.exe 28 PID 928 wrote to memory of 1588 928 quote120485682.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 928 quote120485682.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 928 quote120485682.exe 928 quote120485682.exe -
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\LocalConfig netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\napagent\LocalConfig\Enroll\HcsGroups netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\napagent\LocalConfig\UI netsh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\quote120485682.exe"C:\Users\Admin\AppData\Local\Temp\quote120485682.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\quote120485682.exe"{path}"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵
- Modifies service
PID:1588
-
-