Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
19-10-2021 03:28
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry,png.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Inquiry,png.exe
Resource
win10-en-20211014
General
-
Target
Inquiry,png.exe
-
Size
274KB
-
MD5
214314acb198f14903fb16538450fe69
-
SHA1
d28b62d92aa73da2662f52a20ecb896fbf248806
-
SHA256
fa708dbd323666bef72779702e67ea18192727f8d881ed8cd295619b892e6f1b
-
SHA512
c6a578141238fc0ebeba108f4c325b4d6fa1d2ab37304281253e94f4d7927ebb22fab5bcd411688feed159f57bd5a2cbebcf0200f1e5d29b773392e9be4523b8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.autokarma.ro - Port:
587 - Username:
[email protected] - Password:
auto123#
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/620-55-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/620-56-0x000000000040188B-mapping.dmp family_agenttesla behavioral1/memory/620-58-0x0000000001D90000-0x0000000001DC7000-memory.dmp family_agenttesla behavioral1/memory/620-60-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Loads dropped DLL 1 IoCs
Processes:
Inquiry,png.exepid process 844 Inquiry,png.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Inquiry,png.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry,png.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry,png.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry,png.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Inquiry,png.exedescription pid process target process PID 844 set thread context of 620 844 Inquiry,png.exe Inquiry,png.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Inquiry,png.exepid process 620 Inquiry,png.exe 620 Inquiry,png.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Inquiry,png.exepid process 620 Inquiry,png.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Inquiry,png.exedescription pid process Token: SeDebugPrivilege 620 Inquiry,png.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Inquiry,png.exedescription pid process target process PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe PID 844 wrote to memory of 620 844 Inquiry,png.exe Inquiry,png.exe -
outlook_office_path 1 IoCs
Processes:
Inquiry,png.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry,png.exe -
outlook_win_path 1 IoCs
Processes:
Inquiry,png.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry,png.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry,png.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry,png.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Inquiry,png.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry,png.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
fb556c16d4ab04252f71268c986a5c43
SHA15d8857c0fa4543642286072337af96d8374494a9
SHA2567c818c689d9194c90a1ecdd7838cd59ff216971cad20caf8e091d9fa48c7f3fe
SHA512adbfaf25b5937b934dc920436492faab186f0d5a64a57cb027da88a2c9fb4c8b65740713ff232400a908729ae4a48360a2ba79cce86237b9a79d2a1d840d7fc6