Analysis

  • max time kernel
    182s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 22:19

General

  • Target

    INQUIRY.exe

  • Size

    755KB

  • MD5

    80f173a6a405dcc12a8e3b4b3068c481

  • SHA1

    303de8b04f8d274e762b6a7da8fe71e72ff1bdae

  • SHA256

    a60d036982b1a91c4ccc905f17da542297129040d3c4c5b6546a7158b2e0dcbe

  • SHA512

    2819d68ad38a695898c46ef5f1b4c1c8ca70cc14927acee5339558e3e62b1565a1132769958f36154b268c31a0ba6c9749130137d040f55017a94249237eb195

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.millndustries.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    {zdog:g7S@R3

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe
    "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ITneOFLl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3498.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3944
    • C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe
      "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"
      2⤵
        PID:1296
      • C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe
        "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"
        2⤵
          PID:1080
        • C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe
          "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"
          2⤵
            PID:4236
          • C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe
            "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"
            2⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:4180

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Credential Access

        Credentials in Files

        3
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        3
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\INQUIRY.exe.log
          Filesize

          496B

          MD5

          5b4789d01bb4d7483b71e1a35bce6a8b

          SHA1

          de083f2131c9a763c0d1810c97a38732146cffbf

          SHA256

          e248cef9500ed6e0c9f99d72a2a6a36955a5f0cfc0725748ef25a733cc8282f6

          SHA512

          357e18ef30430e4b9cc4f2569b9735b1cd12f934c83162e4de78ac29ba9703b63ddb624ccc22afd5a5868f6e9d91a3c64581846abac22e9625f5b2e3d80b3ede

        • C:\Users\Admin\AppData\Local\Temp\tmp3498.tmp
          Filesize

          1KB

          MD5

          34918204100aefded604783f23e53256

          SHA1

          1cec3536dd8dc6b1715b8d12e9ef1fcfbc05c295

          SHA256

          d5064fcb7dca44eca15c586bc6bde2832c8c6509e8a45d5b835420b15c5c94d0

          SHA512

          09208b6c61e9495edf7320cbf405c82bd8a0a929d2a99f49bc3e521287e53fc6fd8dc41fffb5362fb32879ac1a26b6914bf11e6938152f42f1974666c37dab4e

        • memory/1080-134-0x0000000000000000-mapping.dmp
        • memory/1296-133-0x0000000000000000-mapping.dmp
        • memory/1764-130-0x0000000074AC0000-0x0000000075071000-memory.dmp
          Filesize

          5.7MB

        • memory/3944-131-0x0000000000000000-mapping.dmp
        • memory/4180-136-0x0000000000000000-mapping.dmp
        • memory/4180-137-0x0000000000400000-0x000000000045A000-memory.dmp
          Filesize

          360KB

        • memory/4180-139-0x0000000074AC0000-0x0000000075071000-memory.dmp
          Filesize

          5.7MB

        • memory/4236-135-0x0000000000000000-mapping.dmp