Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 071.23 020.23.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ 071.23 020.23.exe
Resource
win10v2004-20230220-en
General
-
Target
RFQ 071.23 020.23.exe
-
Size
779KB
-
MD5
bc1fac98c09af837959226f91f6d54c1
-
SHA1
5257b8498fb0df2e06259fa49a6b333f34603944
-
SHA256
1897da9314bfab3a6feaae55d4e82fa4f764c04593c9aedfc4fde0f7e7f7a2dd
-
SHA512
107d3f67e05e46f788c64bcaa3fa7b506a0b0ae4e1907116d0915fb9721fdae5b1bb48ca46a73b14b506909b3a6a06193578425043fb0f16591654b1dfbcb468
-
SSDEEP
24576:jCVZ9BW+n+6AbaGZwMhK5Uu399i/Ml7R5:G3EK+fbbZveUuNP7
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
N!hfzy$8
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RFQ 071.23 020.23.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ 071.23 020.23.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ 071.23 020.23.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ 071.23 020.23.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ 071.23 020.23.exedescription pid process target process PID 4924 set thread context of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
RFQ 071.23 020.23.exeRFQ 071.23 020.23.exepid process 4924 RFQ 071.23 020.23.exe 4924 RFQ 071.23 020.23.exe 4924 RFQ 071.23 020.23.exe 4924 RFQ 071.23 020.23.exe 1252 RFQ 071.23 020.23.exe 1252 RFQ 071.23 020.23.exe 1252 RFQ 071.23 020.23.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RFQ 071.23 020.23.exeRFQ 071.23 020.23.exedescription pid process Token: SeDebugPrivilege 4924 RFQ 071.23 020.23.exe Token: SeDebugPrivilege 1252 RFQ 071.23 020.23.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
RFQ 071.23 020.23.exedescription pid process target process PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe PID 4924 wrote to memory of 1252 4924 RFQ 071.23 020.23.exe RFQ 071.23 020.23.exe -
outlook_office_path 1 IoCs
Processes:
RFQ 071.23 020.23.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ 071.23 020.23.exe -
outlook_win_path 1 IoCs
Processes:
RFQ 071.23 020.23.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ 071.23 020.23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ 071.23 020.23.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 071.23 020.23.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\RFQ 071.23 020.23.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 071.23 020.23.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b7b9acb869ccc7f7ecb5304ec0384dee
SHA16a90751c95817903ee833d59a0abbef425a613b3
SHA2568cb00a15cd942a1861c573d86d6fb430512c8e2f80f6349f48b16b8709ca7aa4
SHA5127bec881ac5f59ac26f1be1e7e26d63f040c06369de10c1c246e531a4395d27c335d9acc647ecdedb48ed37bdc2dc405a4cfc11762e1c00659a49be259eaf8764