Analysis
-
max time kernel
127s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:55
Static task
static1
Behavioral task
behavioral1
Sample
RFQ1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ1.exe
Resource
win10v2004-20220414-en
General
-
Target
RFQ1.exe
-
Size
439KB
-
MD5
ff2bd7b477cf94aae1392840d4e2bbf8
-
SHA1
1c4fbec12640050cccc4f1267bfa6879331c9fad
-
SHA256
2b23bd3f75f21fca9811b646ade99f92cbd26e4892c1f8079716d1925797edb3
-
SHA512
08f4d115ae82ee970e1d816d897dd4a96765b0154aa12661298be7840a18a74b834925b465d19f80d3be7c52bbb40d78c89cebff63822a9d3f6ef71cbafa57df
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
@jaffinmarknma@344
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-61-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1968-62-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1968-63-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1968-66-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1968-68-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1968-64-0x00000000004460AE-mapping.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RFQ1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ1.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ1.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ1.exedescription pid process target process PID 388 set thread context of 1968 388 RFQ1.exe RFQ1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RFQ1.exepid process 1968 RFQ1.exe 1968 RFQ1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RFQ1.exedescription pid process Token: SeDebugPrivilege 1968 RFQ1.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
RFQ1.exedescription pid process target process PID 388 wrote to memory of 2024 388 RFQ1.exe schtasks.exe PID 388 wrote to memory of 2024 388 RFQ1.exe schtasks.exe PID 388 wrote to memory of 2024 388 RFQ1.exe schtasks.exe PID 388 wrote to memory of 2024 388 RFQ1.exe schtasks.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe PID 388 wrote to memory of 1968 388 RFQ1.exe RFQ1.exe -
outlook_office_path 1 IoCs
Processes:
RFQ1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ1.exe -
outlook_win_path 1 IoCs
Processes:
RFQ1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ1.exe"C:\Users\Admin\AppData\Local\Temp\RFQ1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qtWtPU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF670.tmp"2⤵
- Creates scheduled task(s)
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\RFQ1.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fa98c598014a760e64ea31a22d05cf0f
SHA16cdb7727a1a7caa627b89219fc52f8f468173eb7
SHA256b60a09a3a8316e4c1986a7caf83e87449aa1111f63673729a8f240a1f166fa07
SHA512ee19e14def84c4cfd867fd52a0cd6495a4794c6298c44ffdc6af2f86666e3b5515042bae42830ff23036d5684c233ef37a21e235d360b72a1e27fae115c7838d