Analysis
-
max time kernel
143s -
max time network
36s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
17/07/2020, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
Request Quotation.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Request Quotation.exe
Resource
win10
General
-
Target
Request Quotation.exe
-
Size
759KB
-
MD5
9fb2846dca4accdd1c4fcaf212e1c6f6
-
SHA1
b49cfbe4a19d7ab3ee7d1a33425ccc822bba3d2e
-
SHA256
d0b71fdf377abca1c191fedeab8311dac158632edb66f3b894166686d61bfad6
-
SHA512
9ae52ef0f49c06e650c2ede614b6ff5f3a2b6de5cc18b892c5cf72bd583a4919f160ad4c30cac8a126fdaf1e3066a7a674e471138dc70213268f597227e81616
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.varda.com.tr - Port:
587 - Username:
[email protected] - Password:
varda9997929
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/520-4-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/520-5-0x0000000000446E1E-mapping.dmp family_agenttesla behavioral1/memory/520-6-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/520-7-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\CpSnJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CpSnJ\\CpSnJ.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 520 1520 Request Quotation.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1788 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1636 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 520 RegSvcs.exe 520 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1520 Request Quotation.exe Token: SeDebugPrivilege 520 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1788 1520 Request Quotation.exe 26 PID 1520 wrote to memory of 1788 1520 Request Quotation.exe 26 PID 1520 wrote to memory of 1788 1520 Request Quotation.exe 26 PID 1520 wrote to memory of 1788 1520 Request Quotation.exe 26 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 1520 wrote to memory of 520 1520 Request Quotation.exe 28 PID 520 wrote to memory of 1636 520 RegSvcs.exe 30 PID 520 wrote to memory of 1636 520 RegSvcs.exe 30 PID 520 wrote to memory of 1636 520 RegSvcs.exe 30 PID 520 wrote to memory of 1636 520 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xdfilFYBLrw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp894B.tmp"2⤵
- Creates scheduled task(s)
PID:1788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1636
-
-