Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
18-10-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
[Schedule_&_Booking__18th_oct.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
[Schedule_&_Booking__18th_oct.exe
Resource
win10-en-20210920
General
-
Target
[Schedule_&_Booking__18th_oct.exe
-
Size
525KB
-
MD5
4114e15de65a9ec4b8eacc3ef60804bb
-
SHA1
eb450264abe3b3ed70167f267cb974ea13d60260
-
SHA256
d81e35754aa34fb2fd0b850b4f1d8080a64a8408623303d3a8abecea5b0a30de
-
SHA512
256e27521a7008896808a798222025769a00aa155148e843a959c969bb9b7e369a4d57f5d1605fe4c1d1f0704c675df638eea032f602c51d1fb78e2af8e6805c
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
PxhrKDkvikRcSaP2dkv9
Extracted
quasar
2.1.0.0
Office04
grace.adds-only.xyz:1609
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
wHq4o3k6UfKZv19jkcxs
-
install_name
winrara.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Extracted
quasar
- encryption_key
- install_name
- log_directory
-
reconnect_delay
3000
- startup_key
- subdirectory
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/5012-176-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral2/memory/5012-177-0x0000000000486C1E-mapping.dmp disable_win_def behavioral2/memory/5012-197-0x0000000004F60000-0x000000000545E000-memory.dmp disable_win_def -
Quasar Payload 3 IoCs
resource yara_rule behavioral2/memory/5012-176-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral2/memory/5012-177-0x0000000000486C1E-mapping.dmp family_quasar behavioral2/memory/5012-197-0x0000000004F60000-0x000000000545E000-memory.dmp family_quasar -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
AgentTesla Payload 3 IoCs
resource yara_rule behavioral2/memory/2492-126-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/2492-129-0x000000000043780E-mapping.dmp family_agenttesla behavioral2/memory/2492-138-0x00000000054B0000-0x00000000059AE000-memory.dmp family_agenttesla -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 3244 apps.exe 5012 apps.exe 312 winrara.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features apps.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" apps.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 [Schedule_&_Booking__18th_oct.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 [Schedule_&_Booking__18th_oct.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 [Schedule_&_Booking__18th_oct.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\desktop_app = "C:\\Users\\Admin\\AppData\\Roaming\\desktop_app\\desktop_app.exe" [Schedule_&_Booking__18th_oct.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3580 set thread context of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3244 set thread context of 5012 3244 apps.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe 4992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3580 [Schedule_&_Booking__18th_oct.exe 3580 [Schedule_&_Booking__18th_oct.exe 2492 [Schedule_&_Booking__18th_oct.exe 2492 [Schedule_&_Booking__18th_oct.exe 3124 powershell.exe 3124 powershell.exe 3124 powershell.exe 3244 apps.exe 3244 apps.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 1212 powershell.exe 1212 powershell.exe 1212 powershell.exe 5012 apps.exe 5012 apps.exe 5012 apps.exe 5012 apps.exe 5012 apps.exe 5012 apps.exe 5012 apps.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3580 [Schedule_&_Booking__18th_oct.exe Token: SeDebugPrivilege 2492 [Schedule_&_Booking__18th_oct.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 3244 apps.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 5012 apps.exe Token: SeDebugPrivilege 1212 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 [Schedule_&_Booking__18th_oct.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3580 wrote to memory of 3124 3580 [Schedule_&_Booking__18th_oct.exe 70 PID 3580 wrote to memory of 3124 3580 [Schedule_&_Booking__18th_oct.exe 70 PID 3580 wrote to memory of 3124 3580 [Schedule_&_Booking__18th_oct.exe 70 PID 3580 wrote to memory of 2764 3580 [Schedule_&_Booking__18th_oct.exe 72 PID 3580 wrote to memory of 2764 3580 [Schedule_&_Booking__18th_oct.exe 72 PID 3580 wrote to memory of 2764 3580 [Schedule_&_Booking__18th_oct.exe 72 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 3580 wrote to memory of 2492 3580 [Schedule_&_Booking__18th_oct.exe 73 PID 2492 wrote to memory of 3244 2492 [Schedule_&_Booking__18th_oct.exe 79 PID 2492 wrote to memory of 3244 2492 [Schedule_&_Booking__18th_oct.exe 79 PID 2492 wrote to memory of 3244 2492 [Schedule_&_Booking__18th_oct.exe 79 PID 3244 wrote to memory of 4952 3244 apps.exe 80 PID 3244 wrote to memory of 4952 3244 apps.exe 80 PID 3244 wrote to memory of 4952 3244 apps.exe 80 PID 3244 wrote to memory of 4992 3244 apps.exe 82 PID 3244 wrote to memory of 4992 3244 apps.exe 82 PID 3244 wrote to memory of 4992 3244 apps.exe 82 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 3244 wrote to memory of 5012 3244 apps.exe 84 PID 5012 wrote to memory of 312 5012 apps.exe 85 PID 5012 wrote to memory of 312 5012 apps.exe 85 PID 5012 wrote to memory of 312 5012 apps.exe 85 PID 5012 wrote to memory of 1212 5012 apps.exe 86 PID 5012 wrote to memory of 1212 5012 apps.exe 86 PID 5012 wrote to memory of 1212 5012 apps.exe 86 PID 5012 wrote to memory of 4668 5012 apps.exe 88 PID 5012 wrote to memory of 4668 5012 apps.exe 88 PID 5012 wrote to memory of 4668 5012 apps.exe 88 PID 4668 wrote to memory of 1840 4668 cmd.exe 90 PID 4668 wrote to memory of 1840 4668 cmd.exe 90 PID 4668 wrote to memory of 1840 4668 cmd.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 [Schedule_&_Booking__18th_oct.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 [Schedule_&_Booking__18th_oct.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[Schedule_&_Booking__18th_oct.exe"C:\Users\Admin\AppData\Local\Temp\[Schedule_&_Booking__18th_oct.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\[Schedule_&_Booking__18th_oct.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\swqpSTZh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp47A4.tmp"2⤵
- Creates scheduled task(s)
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\[Schedule_&_Booking__18th_oct.exe"C:\Users\Admin\AppData\Local\Temp\[Schedule_&_Booking__18th_oct.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\apps.exe"C:\Users\Admin\AppData\Local\Temp\apps.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\apps.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kCCzCqEnSxl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp96D8.tmp"4⤵
- Creates scheduled task(s)
PID:4992
-
-
C:\Users\Admin\AppData\Local\Temp\apps.exe"C:\Users\Admin\AppData\Local\Temp\apps.exe"4⤵
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\SubDir\winrara.exe"C:\Users\Admin\AppData\Roaming\SubDir\winrara.exe"5⤵
- Executes dropped EXE
PID:312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit5⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*6⤵PID:1840
-
-
-
-
-