Analysis
-
max time kernel
124s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:59
Static task
static1
Behavioral task
behavioral1
Sample
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe
Resource
win10v2004-20220414-en
General
-
Target
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe
-
Size
438KB
-
MD5
1fb477f037a5781626e07de476928154
-
SHA1
d73e53aba93e68cd66c9f68bdce0d1a61d8e7cfe
-
SHA256
cdbac6d4c4c6c722cf135d95f1c0e3d818dc660039ff4ad802c8ce4cc0f7145b
-
SHA512
60d41f5b320d3f29f89b163ebb70e4b06301d0ea6906acafb99e413258fe4d0976580f3f393f10f15590ba30b47edcf6c963163c62e91a02d300a73c6036517c
Malware Config
Extracted
Protocol: smtp- Host:
mail.greebals.gr - Port:
587 - Username:
[email protected] - Password:
g#BE=fpMXx@B
Extracted
agenttesla
Protocol: smtp- Host:
mail.greebals.gr - Port:
587 - Username:
[email protected] - Password:
g#BE=fpMXx@B
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5100-134-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exedescription pid process target process PID 2444 set thread context of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exeRegSvcs.exepid process 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe 5100 RegSvcs.exe 5100 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe Token: SeDebugPrivilege 5100 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exeRegSvcs.exedescription pid process target process PID 2444 wrote to memory of 2832 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe schtasks.exe PID 2444 wrote to memory of 2832 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe schtasks.exe PID 2444 wrote to memory of 2832 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe schtasks.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 2444 wrote to memory of 5100 2444 YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe RegSvcs.exe PID 5100 wrote to memory of 4708 5100 RegSvcs.exe REG.exe PID 5100 wrote to memory of 4708 5100 RegSvcs.exe REG.exe PID 5100 wrote to memory of 4708 5100 RegSvcs.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe"C:\Users\Admin\AppData\Local\Temp\YOKOHAMA TYRE VIETNAM INC RFQ_PDF.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\weKIli" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE60A.tmp"2⤵
- Creates scheduled task(s)
PID:2832 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:5100 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer / v NoRun / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:4708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD545e954d9df40cf6aaff8d5a35dd3495a
SHA11c5e7669f932f12ec15e39e220c0701d79a17ebb
SHA2567aa01d53462258b9203f43bdf7dd2402e0396d332cee053631d4a019c35fbed8
SHA512125b49c8d26fb3650c6d5c258727d13f4d0f82d621e64c0b3fd92123d077736d187f1d5483900fc9191a0b5e811472c8009c1e04cc01aae4452b38f53a7e447b