Resubmissions

07/02/2023, 15:44

230207-s6m55aff5x 10

Analysis

  • max time kernel
    51s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 15:44

General

  • Target

    QUOTE_22.exe

  • Size

    762KB

  • MD5

    bb7da07b2fe227dabe3bca346b7150b6

  • SHA1

    356bf616666407fd318db616382722e45259538d

  • SHA256

    7f490d0ca36f65c1a3e08dbfb095c6b9bf26b7db071c624675635013a5c34cde

  • SHA512

    1d560ed48047f9162ea5a9964faae9ea3a0cfd0b9a1f0ddf24d7d66a3e40eadb2c51a51fca8204cafa1c93f03c6a410cc9b3890ed523ada1ce7e7757d1f745fe

  • SSDEEP

    12288:tOrx7p58lCrd4gyQapWMsR21lyllKG8rQeTS8Q7Rmb0jRtHjqvb9Cpg9dPA:YrxN5IC54TWMwzz8rQASF1mb+HOZV9p

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTE_22.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTE_22.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Users\Admin\AppData\Local\Temp\QUOTE_22.exe
      "C:\Users\Admin\AppData\Local\Temp\QUOTE_22.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1116

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1116-64-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1116-65-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1116-70-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1116-61-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1116-60-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1116-63-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1116-68-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1432-55-0x0000000076391000-0x0000000076393000-memory.dmp

          Filesize

          8KB

        • memory/1432-54-0x0000000001390000-0x0000000001456000-memory.dmp

          Filesize

          792KB

        • memory/1432-59-0x0000000000720000-0x0000000000752000-memory.dmp

          Filesize

          200KB

        • memory/1432-58-0x0000000007EC0000-0x0000000007F4C000-memory.dmp

          Filesize

          560KB

        • memory/1432-57-0x00000000004F0000-0x00000000004FC000-memory.dmp

          Filesize

          48KB

        • memory/1432-56-0x0000000000430000-0x0000000000444000-memory.dmp

          Filesize

          80KB