Analysis
-
max time kernel
182s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
INQUIRY.exe
Resource
win10v2004-20220414-en
General
-
Target
INQUIRY.exe
-
Size
755KB
-
MD5
80f173a6a405dcc12a8e3b4b3068c481
-
SHA1
303de8b04f8d274e762b6a7da8fe71e72ff1bdae
-
SHA256
a60d036982b1a91c4ccc905f17da542297129040d3c4c5b6546a7158b2e0dcbe
-
SHA512
2819d68ad38a695898c46ef5f1b4c1c8ca70cc14927acee5339558e3e62b1565a1132769958f36154b268c31a0ba6c9749130137d040f55017a94249237eb195
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.millndustries.com - Port:
587 - Username:
[email protected] - Password:
{zdog:g7S@R3
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4180-137-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
INQUIRY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation INQUIRY.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
INQUIRY.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 INQUIRY.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 INQUIRY.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 INQUIRY.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
INQUIRY.exedescription pid process target process PID 1764 set thread context of 4180 1764 INQUIRY.exe INQUIRY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
INQUIRY.exeINQUIRY.exepid process 1764 INQUIRY.exe 1764 INQUIRY.exe 1764 INQUIRY.exe 1764 INQUIRY.exe 1764 INQUIRY.exe 1764 INQUIRY.exe 1764 INQUIRY.exe 4180 INQUIRY.exe 4180 INQUIRY.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
INQUIRY.exeINQUIRY.exedescription pid process Token: SeDebugPrivilege 1764 INQUIRY.exe Token: SeDebugPrivilege 4180 INQUIRY.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
INQUIRY.exepid process 4180 INQUIRY.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
INQUIRY.exedescription pid process target process PID 1764 wrote to memory of 3944 1764 INQUIRY.exe schtasks.exe PID 1764 wrote to memory of 3944 1764 INQUIRY.exe schtasks.exe PID 1764 wrote to memory of 3944 1764 INQUIRY.exe schtasks.exe PID 1764 wrote to memory of 1296 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 1296 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 1296 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 1080 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 1080 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 1080 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4236 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4236 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4236 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe PID 1764 wrote to memory of 4180 1764 INQUIRY.exe INQUIRY.exe -
outlook_office_path 1 IoCs
Processes:
INQUIRY.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 INQUIRY.exe -
outlook_win_path 1 IoCs
Processes:
INQUIRY.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 INQUIRY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ITneOFLl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3498.tmp"2⤵
- Creates scheduled task(s)
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"2⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"2⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"2⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496B
MD55b4789d01bb4d7483b71e1a35bce6a8b
SHA1de083f2131c9a763c0d1810c97a38732146cffbf
SHA256e248cef9500ed6e0c9f99d72a2a6a36955a5f0cfc0725748ef25a733cc8282f6
SHA512357e18ef30430e4b9cc4f2569b9735b1cd12f934c83162e4de78ac29ba9703b63ddb624ccc22afd5a5868f6e9d91a3c64581846abac22e9625f5b2e3d80b3ede
-
Filesize
1KB
MD534918204100aefded604783f23e53256
SHA11cec3536dd8dc6b1715b8d12e9ef1fcfbc05c295
SHA256d5064fcb7dca44eca15c586bc6bde2832c8c6509e8a45d5b835420b15c5c94d0
SHA51209208b6c61e9495edf7320cbf405c82bd8a0a929d2a99f49bc3e521287e53fc6fd8dc41fffb5362fb32879ac1a26b6914bf11e6938152f42f1974666c37dab4e