Analysis
-
max time kernel
38s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 11:25
Static task
static1
Behavioral task
behavioral1
Sample
QUOTES_S.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
QUOTES_S.exe
Resource
win10v2004-20221111-en
General
-
Target
QUOTES_S.exe
-
Size
410KB
-
MD5
d0f0167747de9e85ece81cef22a569d7
-
SHA1
aeacddd1050c347e4ac27fdc65a2d7d5422c95e1
-
SHA256
894ca1dfeebe51eb320bd38a7da02c17e1937477a44cd4e8cf008f7a44fa7c3e
-
SHA512
90d58c5f8207d9bbf8a147edb6be2d0b4d676a34619d6e85736de3f5de938ee3fc7195883edfabfdec38f63ef03edce6faa0140a42a429e8fae3bb160543677f
-
SSDEEP
12288:yYXVBHN4C8x0ks0Ouuahj69YeeDtK0Y5tIv3G:yYXVBL8uks0OuNj69beY0Yov3G
Malware Config
Extracted
Protocol: smtp- Host:
mail.ravv.sk - Port:
587 - Username:
[email protected] - Password:
bfE#vKaMi#
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 596 sdjhwceq.exe 940 sdjhwceq.exe -
Loads dropped DLL 2 IoCs
pid Process 1044 QUOTES_S.exe 596 sdjhwceq.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sdjhwceq.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sdjhwceq.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sdjhwceq.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 596 set thread context of 940 596 sdjhwceq.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 596 sdjhwceq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 sdjhwceq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1044 wrote to memory of 596 1044 QUOTES_S.exe 27 PID 1044 wrote to memory of 596 1044 QUOTES_S.exe 27 PID 1044 wrote to memory of 596 1044 QUOTES_S.exe 27 PID 1044 wrote to memory of 596 1044 QUOTES_S.exe 27 PID 596 wrote to memory of 940 596 sdjhwceq.exe 28 PID 596 wrote to memory of 940 596 sdjhwceq.exe 28 PID 596 wrote to memory of 940 596 sdjhwceq.exe 28 PID 596 wrote to memory of 940 596 sdjhwceq.exe 28 PID 596 wrote to memory of 940 596 sdjhwceq.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sdjhwceq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sdjhwceq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTES_S.exe"C:\Users\Admin\AppData\Local\Temp\QUOTES_S.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\sdjhwceq.exe"C:\Users\Admin\AppData\Local\Temp\sdjhwceq.exe" C:\Users\Admin\AppData\Local\Temp\hdoiu.jyv2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\sdjhwceq.exe"C:\Users\Admin\AppData\Local\Temp\sdjhwceq.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5cf5fac3b51c7865c93e78ffade1c45a7
SHA17adfdb32526790e7bfb740f4dee5e58ec8eab5d8
SHA2564a3357158f4612d3a1ce77bbf28e43f9ba5bd74ca7dd3a23a66eab77ff043687
SHA51203f5f778c7c47ce4c28482efa50c3b6a7cbfc5d01b54b88df5e4b4091811a7b02d016bd4ee5a1318618d4ef2eb296dff7eadb462a3d419af1c31feb616c40c82
-
Filesize
5KB
MD58106dba78c7fa7b34219e271755c0fb8
SHA170f8c546f2d1e148d29d5ed35d29d12bcefb1b8c
SHA25693b02fca044b58110594a582c76e6a334a4ee3de1a07c96f7448c73575da1241
SHA51267ee5d57729c80cf9985827f95d1e3efd969fc7acc26113319dd0ca26e8302c11d4bb218683636300b5390aac2a81928b4d8510bfe04b5ac437033e01abc7b3c
-
Filesize
361KB
MD5291e78e8cb84b508b91361d3e66bc90c
SHA191fa0e8de8d4e22f8a816f6a3cdd6dd5de6672d8
SHA256a051234f29631277535b60e99bc4c404c6693838638050e3d16d6048d1edfb17
SHA512b8d23b7e507f3a912cd3559457391d482dbac803980040eabfe7c218627713abe5916a3e38b9879dc6b1611343abe78dc6a2e418c0ac05109975fa49e2d0fb18
-
Filesize
361KB
MD5291e78e8cb84b508b91361d3e66bc90c
SHA191fa0e8de8d4e22f8a816f6a3cdd6dd5de6672d8
SHA256a051234f29631277535b60e99bc4c404c6693838638050e3d16d6048d1edfb17
SHA512b8d23b7e507f3a912cd3559457391d482dbac803980040eabfe7c218627713abe5916a3e38b9879dc6b1611343abe78dc6a2e418c0ac05109975fa49e2d0fb18
-
Filesize
361KB
MD5291e78e8cb84b508b91361d3e66bc90c
SHA191fa0e8de8d4e22f8a816f6a3cdd6dd5de6672d8
SHA256a051234f29631277535b60e99bc4c404c6693838638050e3d16d6048d1edfb17
SHA512b8d23b7e507f3a912cd3559457391d482dbac803980040eabfe7c218627713abe5916a3e38b9879dc6b1611343abe78dc6a2e418c0ac05109975fa49e2d0fb18
-
Filesize
361KB
MD5291e78e8cb84b508b91361d3e66bc90c
SHA191fa0e8de8d4e22f8a816f6a3cdd6dd5de6672d8
SHA256a051234f29631277535b60e99bc4c404c6693838638050e3d16d6048d1edfb17
SHA512b8d23b7e507f3a912cd3559457391d482dbac803980040eabfe7c218627713abe5916a3e38b9879dc6b1611343abe78dc6a2e418c0ac05109975fa49e2d0fb18
-
Filesize
361KB
MD5291e78e8cb84b508b91361d3e66bc90c
SHA191fa0e8de8d4e22f8a816f6a3cdd6dd5de6672d8
SHA256a051234f29631277535b60e99bc4c404c6693838638050e3d16d6048d1edfb17
SHA512b8d23b7e507f3a912cd3559457391d482dbac803980040eabfe7c218627713abe5916a3e38b9879dc6b1611343abe78dc6a2e418c0ac05109975fa49e2d0fb18