Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe
Resource
win10v2004-20220812-en
General
-
Target
RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe
-
Size
320KB
-
MD5
63e817912440c22e2f4a54deb4c66635
-
SHA1
19e2900b300072d06a724b6e9a841453c3f7e4bd
-
SHA256
119b772e275fa11e159c1ab16826be64d9ad1fe2ed0905a08b84bc8c970aa1d0
-
SHA512
fce055056e5c4427bfcc3e6f81aacadcb48428057a512dff8b065c3bde1545ebf81af9004d90879ba9379e824814234cab4f45c284b880efbbee5d0e7a5a71fc
-
SSDEEP
6144:1Ea0+W+YFxNdZB980V6FfYGGzCe4Lr91Cc9dguo5+UsWdn90b7Ku6Nh:Jhqx3L9xspG+RvCUgtwUsM90b+u6Nh
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5472075572:AAH72ryjgTKG52VYCqF2mpPaWaPLe7C91tE/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 1896 cwunduu.exe 1968 cwunduu.exe -
Loads dropped DLL 2 IoCs
pid Process 1756 RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe 1896 cwunduu.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cwunduu.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cwunduu.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cwunduu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1896 set thread context of 1968 1896 cwunduu.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 cwunduu.exe 1968 cwunduu.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1896 cwunduu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 cwunduu.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1896 1756 RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe 27 PID 1756 wrote to memory of 1896 1756 RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe 27 PID 1756 wrote to memory of 1896 1756 RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe 27 PID 1756 wrote to memory of 1896 1756 RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe 27 PID 1896 wrote to memory of 1968 1896 cwunduu.exe 29 PID 1896 wrote to memory of 1968 1896 cwunduu.exe 29 PID 1896 wrote to memory of 1968 1896 cwunduu.exe 29 PID 1896 wrote to memory of 1968 1896 cwunduu.exe 29 PID 1896 wrote to memory of 1968 1896 cwunduu.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cwunduu.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cwunduu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe"C:\Users\Admin\AppData\Local\Temp\RFQ102922-RFQSharjah Oman Engineering llc-pdf.scr.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\cwunduu.exe"C:\Users\Admin\AppData\Local\Temp\cwunduu.exe" C:\Users\Admin\AppData\Local\Temp\vqqqobrihl.qpx2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\cwunduu.exe"C:\Users\Admin\AppData\Local\Temp\cwunduu.exe" C:\Users\Admin\AppData\Local\Temp\vqqqobrihl.qpx3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD535e199494b8da667adbc3f291a32c7e7
SHA1d7dedf0819cc0763c6602315675567b748c0c16a
SHA2560e4897f7d41d1bc8c1c3b5436600aafa82c477cb973c47237c17c16388421f45
SHA51243b243f5475f8ec5ccab3f50aa96bfa8cc969c4fb0293d6210941bad7589e926a77ff99c9dadf79a9cb18496494a3d4c339e6429b4321b50688e5342e70b9986
-
Filesize
7KB
MD535e199494b8da667adbc3f291a32c7e7
SHA1d7dedf0819cc0763c6602315675567b748c0c16a
SHA2560e4897f7d41d1bc8c1c3b5436600aafa82c477cb973c47237c17c16388421f45
SHA51243b243f5475f8ec5ccab3f50aa96bfa8cc969c4fb0293d6210941bad7589e926a77ff99c9dadf79a9cb18496494a3d4c339e6429b4321b50688e5342e70b9986
-
Filesize
7KB
MD535e199494b8da667adbc3f291a32c7e7
SHA1d7dedf0819cc0763c6602315675567b748c0c16a
SHA2560e4897f7d41d1bc8c1c3b5436600aafa82c477cb973c47237c17c16388421f45
SHA51243b243f5475f8ec5ccab3f50aa96bfa8cc969c4fb0293d6210941bad7589e926a77ff99c9dadf79a9cb18496494a3d4c339e6429b4321b50688e5342e70b9986
-
Filesize
287KB
MD5356aa1aa6744c55ec6c439710f4f0e97
SHA150ab805a810f6041c338ec6ac086db9b180100af
SHA256ba92154c811d1bd93b2d2937b8a324d5e694d378ecb249b062e9e826ae83ae76
SHA5122daf8ff378b81bb5e4cda45960a17751900616d429eb35cb25120796681208267f899627a3b0e4bdab269e6d6693960b80ff4a413f22c80726cd3ebc749ed2b4
-
Filesize
5KB
MD5bdd2b7dfcc23026c6fe8719503773735
SHA159b4027cb5e06ba5d9fac032cfcccdc20ee1e745
SHA2565b856e5af9f1541789669ba15316bae065284bfd8bc1d977cb79e749299f2080
SHA51265d05728012daf6665bc351faa06cdba87414b04007040459ee4f957115238ae878ca614e60b7d4627d8acc7ae4f6a1054f387e623fe64bcefdc76dbdbcc4fb0
-
Filesize
7KB
MD535e199494b8da667adbc3f291a32c7e7
SHA1d7dedf0819cc0763c6602315675567b748c0c16a
SHA2560e4897f7d41d1bc8c1c3b5436600aafa82c477cb973c47237c17c16388421f45
SHA51243b243f5475f8ec5ccab3f50aa96bfa8cc969c4fb0293d6210941bad7589e926a77ff99c9dadf79a9cb18496494a3d4c339e6429b4321b50688e5342e70b9986
-
Filesize
7KB
MD535e199494b8da667adbc3f291a32c7e7
SHA1d7dedf0819cc0763c6602315675567b748c0c16a
SHA2560e4897f7d41d1bc8c1c3b5436600aafa82c477cb973c47237c17c16388421f45
SHA51243b243f5475f8ec5ccab3f50aa96bfa8cc969c4fb0293d6210941bad7589e926a77ff99c9dadf79a9cb18496494a3d4c339e6429b4321b50688e5342e70b9986