Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2022, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
QTN NO 11478.exe
Resource
win7-20220901-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
QTN NO 11478.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
QTN NO 11478.exe
-
Size
891KB
-
MD5
1179dd8e427142d60d82f588fcdb2138
-
SHA1
03cb870e3ba8994943709b0f6c15bde9ebe20d04
-
SHA256
bd9a3bc50f3ecfc434b0028f3ded4491fa735e837623f268c7bbf4adf0ccf3e9
-
SHA512
cc4cb1d1291fce22a637722c47a92f78e5bba894fe6cd3429189bc3807b4d8bd52b55c104ce51f07b8995663167555b08e037bdb3b6ceb17ab0b58ecb9e765fc
-
SSDEEP
12288:DUx1l4E2P1dzsCBW/T9smPym20WJ5oxswsJ42//1NjoIHN:gt4E2P1dzsCqRXWLox5sXnfkk
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
mail.rimiapparelsltd.com - Port:
587 - Username:
[email protected] - Password:
Ijeomam28@
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.rimiapparelsltd.com - Port:
587 - Username:
[email protected] - Password:
Ijeomam28@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QTN NO 11478.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QTN NO 11478.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QTN NO 11478.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 5084 1960 QTN NO 11478.exe 98 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 PID 1960 wrote to memory of 5084 1960 QTN NO 11478.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QTN NO 11478.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QTN NO 11478.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QTN NO 11478.exe"C:\Users\Admin\AppData\Local\Temp\QTN NO 11478.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\QTN NO 11478.exe"C:\Users\Admin\AppData\Local\Temp\QTN NO 11478.exe"2⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:5084
-