Analysis

  • max time kernel
    53s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2022 16:36

General

  • Target

    Enquiry-102.exe

  • Size

    1017KB

  • MD5

    6705f5fbfd331423b96b3f3145714ba0

  • SHA1

    8aacacb39de72635862e69def1c035e2b4db0014

  • SHA256

    40eacf74e5f8d9b40c3a70ba66a6c30deee60c2843f94fe387ccb0dbb7a2cd59

  • SHA512

    e9cf8d6734a1876fb195648d32938152ca0c65a0a3a18c18b5656715da88ab10cf44b2f26a1a6d0aff758c43ec715f9648dd8143b0e63cfee2919e647d1ccdcc

  • SSDEEP

    12288:Vm2iNQxaJ2uYYK27h/ZmPQLR+C7MeE12mDzvo0UAQHLoL36p5h5uO2z2vWQqE:E10CN/ZfLR+oMeCfvo0UAT

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Enquiry-102.exe
    "C:\Users\Admin\AppData\Local\Temp\Enquiry-102.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\Enquiry-102.exe
      "C:\Users\Admin\AppData\Local\Temp\Enquiry-102.exe"
      2⤵
        PID:1704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1512-54-0x0000000000B60000-0x0000000000C64000-memory.dmp

      Filesize

      1.0MB

    • memory/1512-55-0x00000000756A1000-0x00000000756A3000-memory.dmp

      Filesize

      8KB

    • memory/1512-56-0x0000000000650000-0x0000000000668000-memory.dmp

      Filesize

      96KB

    • memory/1512-57-0x0000000000910000-0x000000000091C000-memory.dmp

      Filesize

      48KB

    • memory/1512-58-0x0000000004DB0000-0x0000000004E42000-memory.dmp

      Filesize

      584KB

    • memory/1512-59-0x0000000004860000-0x000000000489A000-memory.dmp

      Filesize

      232KB

    • memory/1704-60-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1704-61-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1704-63-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1704-64-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1704-66-0x0000000000435A3E-mapping.dmp

    • memory/1704-65-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1704-68-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB