Analysis

  • max time kernel
    28s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30-03-2023 07:34

General

  • Target

    QUOTATION#235878.exe

  • Size

    893KB

  • MD5

    87a0518430f27f497e7d311547c3cc49

  • SHA1

    3105b3ed593ca26a4faaf253c8ad037a8adacf8e

  • SHA256

    a7c284be487a9a722313747a9d976173d074e4463ededc53668cd925b7793147

  • SHA512

    3102f443d1865bfb69cf204b067493861aaf40e4245fda3c1bfa987f29100eb75aee10f4f56cfe49eb9dd55b6f957a0c3a34ed96bc5803dbb76b622c7464a6f7

  • SSDEEP

    12288:d+nA3fWDsZt6wlr0T4ytyFAGuNPeG9rHJRhip1qJv6nnjqKoea:AA3fWDsT6wl0ByJRG973CqZ6nnjqKoea

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    Xec[t)4]dk2D

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTATION#235878.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTATION#235878.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
      2⤵
        PID:1924
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
        2⤵
          PID:1908
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
          2⤵
            PID:528
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"
            2⤵
              PID:572
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
              2⤵
                PID:1064
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                2⤵
                  PID:608
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
                  2⤵
                    PID:1428
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                    2⤵
                    • Accesses Microsoft Outlook profiles
                    • Adds Run key to start application
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • outlook_office_path
                    • outlook_win_path
                    PID:1328

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1328-57-0x0000000000400000-0x0000000000466000-memory.dmp

                  Filesize

                  408KB

                • memory/1328-61-0x0000000000400000-0x0000000000466000-memory.dmp

                  Filesize

                  408KB

                • memory/1328-59-0x0000000000400000-0x0000000000466000-memory.dmp

                  Filesize

                  408KB

                • memory/1328-62-0x0000000004C50000-0x0000000004C90000-memory.dmp

                  Filesize

                  256KB

                • memory/1328-82-0x0000000004C50000-0x0000000004C90000-memory.dmp

                  Filesize

                  256KB

                • memory/1928-54-0x00000000012E0000-0x00000000013C4000-memory.dmp

                  Filesize

                  912KB

                • memory/1928-55-0x000000001A7D0000-0x000000001A876000-memory.dmp

                  Filesize

                  664KB

                • memory/1928-56-0x000000001B2E0000-0x000000001B360000-memory.dmp

                  Filesize

                  512KB