Analysis
-
max time kernel
62s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/03/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
REquest For Quotations62382352934027945.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
REquest For Quotations62382352934027945.exe
Resource
win10v2004-20230220-en
General
-
Target
REquest For Quotations62382352934027945.exe
-
Size
1.1MB
-
MD5
9850d0bb9b12f8fd2c5a8d36505d8344
-
SHA1
33bdb4d051a197cb8eaeff5eb7b3dd0c0b054f25
-
SHA256
7d0df4a5c66045f3a5291234e99960dee0bf9acbafcd25312084e39ff33f8024
-
SHA512
896e798b2fa116ed042d3d241d1f780c6d85d22317862594ca714007bff110bd8f96d84f749f4e790ca08c180157603de3af4f25955227e48f5de901a72b0dc3
-
SSDEEP
24576:LuOZ6wGkB+e9uf8mSYOT7QRoF+NxZhuKFZ65B:uDOTD8xZ3FZ65B
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
HNnNLPY3 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REquest For Quotations62382352934027945.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REquest For Quotations62382352934027945.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REquest For Quotations62382352934027945.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1376 set thread context of 292 1376 REquest For Quotations62382352934027945.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 292 REquest For Quotations62382352934027945.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 PID 1376 wrote to memory of 292 1376 REquest For Quotations62382352934027945.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REquest For Quotations62382352934027945.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REquest For Quotations62382352934027945.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REquest For Quotations62382352934027945.exe"C:\Users\Admin\AppData\Local\Temp\REquest For Quotations62382352934027945.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\REquest For Quotations62382352934027945.exe"C:\Users\Admin\AppData\Local\Temp\REquest For Quotations62382352934027945.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:292
-