Analysis
-
max time kernel
149s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.r00 (2).exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
QUOTATION.r00 (2).exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
QUOTATION.r00 (2).exe
-
Size
1.2MB
-
MD5
bf05079c097081e64bc96ffee3fe6588
-
SHA1
4da9c7da66aa2600c6aec67995c13da914121120
-
SHA256
b38a589a873aae6cf2bdfa37dfc8be7140e470bbc5418eb271f25f7575ee4dd4
-
SHA512
338d132a89ff987242ecd55259d4413dfeb3b12b88ba0e9922e9b93cd38f0752ff1467cb088f4e839245e40745cce796874664c437b6248c4d5b0bb562074173
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.framafilms.com - Port:
587 - Username:
[email protected] - Password:
lister11
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/320-73-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/320-74-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/320-75-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/320-76-0x0000000000445D3E-mapping.dmp family_agenttesla behavioral1/memory/320-78-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/320-80-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\BAVLA = "C:\\Users\\Admin\\AppData\\Roaming\\BAVLA\\BAVLA.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
QUOTATION.r00 (2).exeRegSvcs.exedescription pid process target process PID 1864 set thread context of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1796 set thread context of 320 1796 RegSvcs.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
QUOTATION.r00 (2).exeRegSvcs.exeRegSvcs.exepid process 1864 QUOTATION.r00 (2).exe 1864 QUOTATION.r00 (2).exe 1796 RegSvcs.exe 320 RegSvcs.exe 320 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
QUOTATION.r00 (2).exeRegSvcs.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1864 QUOTATION.r00 (2).exe Token: SeDebugPrivilege 1796 RegSvcs.exe Token: SeDebugPrivilege 320 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
QUOTATION.r00 (2).exeRegSvcs.exedescription pid process target process PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1864 wrote to memory of 1796 1864 QUOTATION.r00 (2).exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe PID 1796 wrote to memory of 320 1796 RegSvcs.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION.r00 (2).exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION.r00 (2).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320