Analysis
-
max time kernel
82s -
max time network
76s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09-07-2020 08:33
Static task
static1
Behavioral task
behavioral1
Sample
quote120485682.exe
Resource
win7
Behavioral task
behavioral2
Sample
quote120485682.exe
Resource
win10v200430
General
-
Target
quote120485682.exe
-
Size
572KB
-
MD5
dd4e839e69d63224da693caf05e34281
-
SHA1
f8a382f169d26693f1f7d9a9c36713097e635770
-
SHA256
8cab6c0718ebfebd219f078bf3c5a7271a58c93e3f37a7a0ed1b27b91e14111b
-
SHA512
65e7fe6eacaf928555d875fcc92522a58cf5334e3f2b53fc2c63b5f82e00e35355b7363bf444a73bd00fe9c1cbb95d859664e3806dcc73934ae435d067ddf2d7
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
1xH}wgu7}f%E
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1984 quote120485682.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 504 wrote to memory of 1984 504 quote120485682.exe 69 PID 1984 wrote to memory of 3964 1984 quote120485682.exe 74 PID 1984 wrote to memory of 3964 1984 quote120485682.exe 74 PID 1984 wrote to memory of 3964 1984 quote120485682.exe 74 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 504 set thread context of 1984 504 quote120485682.exe 69 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 quote120485682.exe 1984 quote120485682.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 quote120485682.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\quote120485682.exe"C:\Users\Admin\AppData\Local\Temp\quote120485682.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:504 -
C:\Users\Admin\AppData\Local\Temp\quote120485682.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1984 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:3964
-
-