Analysis
-
max time kernel
43s -
max time network
131s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 19:43
Behavioral task
behavioral1
Sample
Inquiry 8700.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Inquiry 8700.exe
Resource
win10v20201028
General
-
Target
Inquiry 8700.exe
-
Size
515KB
-
MD5
8d1958f3ff1bd3cb56b6c9e6e0d75c4a
-
SHA1
596a1a28554786ce343e9ea0aaa69a76bc28d8e2
-
SHA256
7b01e7eaa276275cb58f890900e7852f59be59905804ecae7d0011a58c8ca2fa
-
SHA512
9835fe7298aa1c567aee2855ccb8aafe393c7933af06346d55e441db423b891982c5aa244c56263452832e52de59c3d926db5c27dbcc73b35861e7cab78f2eee
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
Inquiry 8700.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage Inquiry 8700.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Inquiry 8700.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com.br\Total = "6" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com.br\ = "0" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com.br\ = "391" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com.br\Total = "391" Inquiry 8700.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com.br Inquiry 8700.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com.br\ = "6" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com.br\Total = "0" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "391" Inquiry 8700.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main Inquiry 8700.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com.br Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "397" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com.br\ = "397" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com.br\Total = "397" Inquiry 8700.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com.br\NumberOfSubdomains = "1" Inquiry 8700.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Inquiry 8700.exepid process 1664 Inquiry 8700.exe 1664 Inquiry 8700.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Inquiry 8700.exedescription pid process Token: SeDebugPrivilege 1664 Inquiry 8700.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Inquiry 8700.exepid process 1664 Inquiry 8700.exe 1664 Inquiry 8700.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/540-62-0x000007FEF5B70000-0x000007FEF5DEA000-memory.dmpFilesize
2.5MB