Analysis

  • max time kernel
    120s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:15

General

  • Target

    QUOTE B1018364.pdf.exe

  • Size

    575KB

  • MD5

    05352f6976f6aa5740d2d502022c00b2

  • SHA1

    f15ff63912bbbacb4454d58a12f08240f971b974

  • SHA256

    4b6a3f081e8c3446ceda38794bf4922dff17d04cd79759b4bd543b0c5df7a4a3

  • SHA512

    c5c3b99a16aecbba08adf4ea92bbeeb61e25263af46c6a1362740e3459b37683b04411813e8f51cb20a4e27d7a428f43456a46bf0d4bda9a5f3ed52ce0afb230

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    H(FPf]j;OgNA

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 6 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTE B1018364.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTE B1018364.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "{path}"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1140

Network

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1140-64-0x0000000000454C0E-mapping.dmp
  • memory/1140-58-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-59-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-61-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-62-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-63-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-66-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-68-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/1140-69-0x0000000075C71000-0x0000000075C73000-memory.dmp
    Filesize

    8KB

  • memory/1800-55-0x0000000000260000-0x000000000026A000-memory.dmp
    Filesize

    40KB

  • memory/1800-56-0x0000000004C70000-0x0000000004CF2000-memory.dmp
    Filesize

    520KB

  • memory/1800-57-0x0000000007970000-0x00000000079E6000-memory.dmp
    Filesize

    472KB

  • memory/1800-54-0x00000000011B0000-0x0000000001246000-memory.dmp
    Filesize

    600KB