Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2023, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe
Resource
win10v2004-20221111-en
General
-
Target
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe
-
Size
1.4MB
-
MD5
1e667b9347d95ae3ed896fd2d7a07004
-
SHA1
8acc1da971d6c41224cb3a4ecea6d8cfd17d463e
-
SHA256
eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40
-
SHA512
da2f988d322aedfae77d5146ec8dbfbc8221448b5f09fac67f2e6f71dec363dc996fe44d8903b6dc125b2f7d9dd4cf41d478653e3162a5897fc5de6e656e6b52
-
SSDEEP
24576:QAOcZNO5kFiNBfipwizdoq21GhKP770lYglQTQD3+L8Fl:OEsNQdXo7IlYgaG+L0l
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1836400811:AAHbceSsBewgu2-18DdhyOIr5kwyIr-_36E/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 1688 prqkrhdxll.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run prqkrhdxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5_52\\PRQKRH~1.EXE C:\\Users\\Admin\\AppData\\Local\\Temp\\5_52\\qpjac.wjt" prqkrhdxll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AutoUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5_52\\Update.vbs" prqkrhdxll.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org 11 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2596 1688 prqkrhdxll.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 2596 RegSvcs.exe 2596 RegSvcs.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 2596 RegSvcs.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe 1688 prqkrhdxll.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1044 4460 eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe 80 PID 4460 wrote to memory of 1044 4460 eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe 80 PID 4460 wrote to memory of 1044 4460 eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe 80 PID 1044 wrote to memory of 1688 1044 WScript.exe 81 PID 1044 wrote to memory of 1688 1044 WScript.exe 81 PID 1044 wrote to memory of 1688 1044 WScript.exe 81 PID 1688 wrote to memory of 2596 1688 prqkrhdxll.exe 82 PID 1688 wrote to memory of 2596 1688 prqkrhdxll.exe 82 PID 1688 wrote to memory of 2596 1688 prqkrhdxll.exe 82 PID 1688 wrote to memory of 2596 1688 prqkrhdxll.exe 82 PID 1688 wrote to memory of 2596 1688 prqkrhdxll.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe"C:\Users\Admin\AppData\Local\Temp\eff08088f90a7edb6db9e6561249dce53c56c4a682cd114e43befabed147fc40.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\5_52\vjdqtt.vbe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\5_52\prqkrhdxll.exe"C:\Users\Admin\AppData\Local\Temp\5_52\prqkrhdxll.exe" qpjac.wjt3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2596
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5de2e788a4b32267ffa9d168caebda262
SHA19f7bb2c7c83ca3007bcb517794b449f1468cbe4c
SHA256487c05a065ee32b2c653f6028ef0652ea4b86231e105789324f2dce53ddc250e
SHA512d33aa7e3407481e2b3211ce4fe56cb773b29a2521a068fbc8056dbd4c3bddd53bd2ae80cd0686feaaee795729b647dee0230f6d1b76624e84b833a077367c73b
-
Filesize
1.1MB
MD5523ca3f2ebf61412d374b045e4e6521f
SHA146082730d8d0f7e25f6851c2bface6b322b299c7
SHA256280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d
SHA5126d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866
-
Filesize
1.1MB
MD5523ca3f2ebf61412d374b045e4e6521f
SHA146082730d8d0f7e25f6851c2bface6b322b299c7
SHA256280ed2ff8f0b3c9482abe3620ad99b20a8002ddcf2aa0fdc8ab115a03992439d
SHA5126d08f1bd503a88e123e0f1b48a688a1d2a765afdff39f4c270c902f10f4be34098ef9f319b6cbb7961abd646b285947dd5b81a0c2ba21aace860780470a1d866
-
Filesize
156.9MB
MD5d07d65dca9f6ec153e59f245e9aa1fa1
SHA17165ff3b321ff1c4e7794ba554ac5cd729f068ab
SHA256f3ed242d13cc8200f3d98a0de469981d5f9b5ef844b41ef48ac397d5182b1359
SHA512fd2dfd8180fe1252c2778a562571d5fb74d363af703a6e503b9b0954100eb968c33549ffe785e6b089b022dbf9b861b6fb1b50a2a3cfbd2186d162092dbb404a
-
Filesize
436KB
MD5dc7108ed04f5cdbc321dad6b9446f6e8
SHA18e07a4fff84d3f711c5382c27bddf3ef3c51ce1c
SHA2567be1f4b63b4fff029bbb7705081fc80204bd0e8a6ec214cde23c0de70670a30a
SHA512db021420db14c8e104c2de45d447d4abebe165864f01553d812ac830502e3eda57cee32a8287259a5f8e55e5c5f7bea3437c8ab338e20203a9f94764450b07b8
-
Filesize
28KB
MD509a25800d47096e75796cdc17fddb6b5
SHA1cc0d5036d697f28465b32caacdaa1e76a242aec6
SHA256c48de33f08490c6390d80f3e9314b896714ec3bba29214fa07ebe49baed05bbb
SHA5123e61bbd55495ae89020251f249a04d1207547c725aad2024b67d2ca2e2f2487ca77d719fdba0d107fd85381d8d45e6cdb1c57071064dbbe09d626ad146ccf776