Analysis

  • max time kernel
    114s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 02:28

General

  • Target

    Quotation.exe

  • Size

    774KB

  • MD5

    6dd7542b5145cc3367062c8de480350c

  • SHA1

    d04897139836b9492a3c5036eacac7fc41160dcf

  • SHA256

    10167fec5a00f7ee3805a502684ca59887be73bc350946a0f7989080e06859d8

  • SHA512

    c6c05d1be62e093ef8e5c61e034752e863b322fd546331081769809e5d24c23aa2984960ae48cd6a1f68749535063553ca57606fb27d43a28d28b3af5921e35f

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.pengteh.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    am%pjs@8

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DqsjlyXdLYiYQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C42.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4820
    • C:\Users\Admin\AppData\Local\Temp\Quotation.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4908

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation.exe.log
    Filesize

    1KB

    MD5

    17573558c4e714f606f997e5157afaac

    SHA1

    13e16e9415ceef429aaf124139671ebeca09ed23

    SHA256

    c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

    SHA512

    f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

  • C:\Users\Admin\AppData\Local\Temp\tmp8C42.tmp
    Filesize

    1KB

    MD5

    af64c7c713db67ff320a97d9103eac32

    SHA1

    c70ad840b9026eb599cfd39611a5d152216f1bd2

    SHA256

    1f5ee5ec2932521ace6e2672188b7b3078c9e23905e11953d529b51b0ea24400

    SHA512

    ed8832ce342ac6e808f2b33cba7c367e7c5c5d057118dbff30d5ca6f76b3abe83aca7a6e26c15e8b099a09fa8cadb01668c9c680af8711bc36972514ddd67c1e

  • memory/4628-131-0x0000000007550000-0x00000000075EC000-memory.dmp
    Filesize

    624KB

  • memory/4628-132-0x0000000007BA0000-0x0000000008144000-memory.dmp
    Filesize

    5.6MB

  • memory/4628-133-0x0000000007690000-0x0000000007722000-memory.dmp
    Filesize

    584KB

  • memory/4628-134-0x00000000075F0000-0x00000000075FA000-memory.dmp
    Filesize

    40KB

  • memory/4628-135-0x0000000007730000-0x0000000007786000-memory.dmp
    Filesize

    344KB

  • memory/4628-130-0x0000000000610000-0x00000000006D8000-memory.dmp
    Filesize

    800KB

  • memory/4820-136-0x0000000000000000-mapping.dmp
  • memory/4908-139-0x0000000000400000-0x000000000045A000-memory.dmp
    Filesize

    360KB

  • memory/4908-138-0x0000000000000000-mapping.dmp
  • memory/4908-141-0x0000000005E00000-0x0000000005E66000-memory.dmp
    Filesize

    408KB

  • memory/4908-142-0x0000000006610000-0x0000000006660000-memory.dmp
    Filesize

    320KB