Analysis
-
max time kernel
108s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2022, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
Quote 51098672.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Quote 51098672.exe
Resource
win10v2004-20220901-en
General
-
Target
Quote 51098672.exe
-
Size
491KB
-
MD5
c12335461ad8b615c3c3e5a9eb2fc6fe
-
SHA1
e01e2513dc5f3d9e9606cfcafc4ea2f4df6951f4
-
SHA256
93e0b228bcdc4b79836827a3b9c8afa09c97e1b22307f51b82f4d0ca841f39c2
-
SHA512
1602551b533aa745acccf5b2ccfc93edfe2916c5bfe332761b9b82026900c9e8d39d04ab0dcd66342e976948dbf1098adc98e17fe3ddcfd6605c2e950704a7bf
-
SSDEEP
6144:fweEJv7p3QTwn5MCL3YT+9VrtPsG6zVLlTqB+TyFQiEW1yp2eNQFCm:yzFQTwMCMT+9VpPsU+Try0se24m
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 4880 dkvegoxfbp.exe 1192 dkvegoxfbp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dkvegoxfbp.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dkvegoxfbp.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dkvegoxfbp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hfdky = "C:\\Users\\Admin\\AppData\\Roaming\\vkjdoavacs\\jcdrn.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dkvegoxfbp.exe\"" dkvegoxfbp.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\App = "C:\\Users\\Admin\\AppData\\Roaming\\App\\App.exe" dkvegoxfbp.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org 10 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4880 set thread context of 1192 4880 dkvegoxfbp.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1192 dkvegoxfbp.exe 1192 dkvegoxfbp.exe 1192 dkvegoxfbp.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4880 dkvegoxfbp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1192 dkvegoxfbp.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4880 1572 Quote 51098672.exe 80 PID 1572 wrote to memory of 4880 1572 Quote 51098672.exe 80 PID 1572 wrote to memory of 4880 1572 Quote 51098672.exe 80 PID 4880 wrote to memory of 1192 4880 dkvegoxfbp.exe 82 PID 4880 wrote to memory of 1192 4880 dkvegoxfbp.exe 82 PID 4880 wrote to memory of 1192 4880 dkvegoxfbp.exe 82 PID 4880 wrote to memory of 1192 4880 dkvegoxfbp.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dkvegoxfbp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dkvegoxfbp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote 51098672.exe"C:\Users\Admin\AppData\Local\Temp\Quote 51098672.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\dkvegoxfbp.exe"C:\Users\Admin\AppData\Local\Temp\dkvegoxfbp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\dkvegoxfbp.exe"C:\Users\Admin\AppData\Local\Temp\dkvegoxfbp.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1192
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD54ed1d248d179d6dfa60a58ef2eb20e7a
SHA17fab9cd54f7b063f389491e8b7d1a9d72750717b
SHA256d9b3ffb095a03122d6307f4a1227d2ba161ae1d8d7497756bc5881d0fbda5bc5
SHA51214e08f90497d9bf2e4f44cbf0030bbd2f843fce7fc62759ec4ca0ac353da17c4f9547e610f95855494257ae69e6c10ac426ac6d1343f8f66a0647126ada76bdb
-
Filesize
296KB
MD5b385f41b07aeb4511765e0d56a7b334b
SHA12f7a5938bb349281dccdbdc619cee78d4269d00d
SHA256428332bc46a7fcaf99a4e6ed7df6fe12f6f3942af73953df97e29dccf19e50f9
SHA512475dde9a3781f3dc1132924c6236aa938454ec717ce2d652f66864290df2d52aaaf4c8fbdf8a504a27c573707b88b7b05dc949fde5e71adf3d18bff72bd88562
-
Filesize
5KB
MD5cabde658d98b2c6b0db0124f03543b3b
SHA19ff99fcb663bd9026970892ecb8238a6e200c1ee
SHA256d93721684f193337a1698c1c91411af419dd78f97150713c87cb91a92d3b008d
SHA5123b08faec1bf2068b589948cd404d103c2cec0fd794da0ea0b0bea8e4518634717bee0ab2fc96042cfbec866a46f861318c60d7e00d37ddde9839aca2bb9f89c4
-
Filesize
5KB
MD5cabde658d98b2c6b0db0124f03543b3b
SHA19ff99fcb663bd9026970892ecb8238a6e200c1ee
SHA256d93721684f193337a1698c1c91411af419dd78f97150713c87cb91a92d3b008d
SHA5123b08faec1bf2068b589948cd404d103c2cec0fd794da0ea0b0bea8e4518634717bee0ab2fc96042cfbec866a46f861318c60d7e00d37ddde9839aca2bb9f89c4
-
Filesize
5KB
MD5cabde658d98b2c6b0db0124f03543b3b
SHA19ff99fcb663bd9026970892ecb8238a6e200c1ee
SHA256d93721684f193337a1698c1c91411af419dd78f97150713c87cb91a92d3b008d
SHA5123b08faec1bf2068b589948cd404d103c2cec0fd794da0ea0b0bea8e4518634717bee0ab2fc96042cfbec866a46f861318c60d7e00d37ddde9839aca2bb9f89c4