Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:59
Static task
static1
Behavioral task
behavioral1
Sample
a7d596f3e0ad4965d39552998f6eccffb7aa7533a1ff3c2614936864509c9a62.zip
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a7d596f3e0ad4965d39552998f6eccffb7aa7533a1ff3c2614936864509c9a62.zip
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
NEW RFQ.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
NEW RFQ.exe
Resource
win10v2004-20220414-en
General
-
Target
NEW RFQ.exe
-
Size
760KB
-
MD5
dac1de5239180e2069ab67c8a8e7c44b
-
SHA1
0d1400e85febc34131236e94aff353ff681be293
-
SHA256
49700ee70d04597630dacefa2203c0f12f412ece9a93ffdb09ab18e5cce00524
-
SHA512
5d23cc399dfb610b596f8c10065ff45f2d6e4d382325539abbd3566f4211ef305f231a68c762c484681a785d0d1e0384775e990b8e8e1f44ba240724eaa7b392
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.flsrnidth.com - Port:
587 - Username:
[email protected] - Password:
x{Op,7(4O+yl
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4400-136-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
NEW RFQ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation NEW RFQ.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
NEW RFQ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 NEW RFQ.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 NEW RFQ.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 NEW RFQ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NEW RFQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YYtJku = "C:\\Users\\Admin\\AppData\\Roaming\\YYtJku\\YYtJku.exe" NEW RFQ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NEW RFQ.exedescription pid process target process PID 4588 set thread context of 4400 4588 NEW RFQ.exe NEW RFQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
NEW RFQ.exeNEW RFQ.exepid process 4588 NEW RFQ.exe 4588 NEW RFQ.exe 4588 NEW RFQ.exe 4588 NEW RFQ.exe 4588 NEW RFQ.exe 4588 NEW RFQ.exe 4400 NEW RFQ.exe 4400 NEW RFQ.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
NEW RFQ.exepid process 4400 NEW RFQ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
NEW RFQ.exeNEW RFQ.exedescription pid process Token: SeDebugPrivilege 4588 NEW RFQ.exe Token: SeDebugPrivilege 4400 NEW RFQ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
NEW RFQ.exedescription pid process target process PID 4588 wrote to memory of 3064 4588 NEW RFQ.exe schtasks.exe PID 4588 wrote to memory of 3064 4588 NEW RFQ.exe schtasks.exe PID 4588 wrote to memory of 3064 4588 NEW RFQ.exe schtasks.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe PID 4588 wrote to memory of 4400 4588 NEW RFQ.exe NEW RFQ.exe -
outlook_office_path 1 IoCs
Processes:
NEW RFQ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 NEW RFQ.exe -
outlook_win_path 1 IoCs
Processes:
NEW RFQ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 NEW RFQ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW RFQ.exe"C:\Users\Admin\AppData\Local\Temp\NEW RFQ.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6CF2.tmp"2⤵
- Creates scheduled task(s)
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\NEW RFQ.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
611B
MD5bceb1b24038a079a8046db250ce33039
SHA195d2a21b00e5c127f023d2950afe052d2acba572
SHA256d5237a1aac346aaff3cedaca0a567afa529b84a21676e4c7017c9f87cfb32d57
SHA512182dc30cd1e600da9b7ea1ca12860fd82237b04de293899d19ab7edb8b2bcdb37e30d387bbdbb54acdbecdb8200f5a39d417abd91d2b4c11fd126a9e4d0f050e
-
Filesize
1KB
MD5ab9f8a9574d9209cd8666decb37e33cc
SHA1b768b98d37b96bcf5eeeb4bae10589a196b66db2
SHA2562c052172f943620c36053efd2ab1d6ef9fbb671c55669b9f49430f0f7acd7704
SHA5125059538580cce17a2c7516e3117297310455e38ff32d51c6e17ef188448ce3567f9c968ad478df725ed2ce8630ceee2340246264a6e60877895591a67d45da70