Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 09:14
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION#231984.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
QUOTATION#231984.exe
Resource
win10v2004-20230220-en
General
-
Target
QUOTATION#231984.exe
-
Size
1.7MB
-
MD5
319307604d727fd2caeac236cb968b27
-
SHA1
c0723f45066f65812092eb768f994bbea5683085
-
SHA256
78d2c30f07aacb40da92c21af1dc660a690074ee35da707c81d06d146c631a28
-
SHA512
d2e80e344da7129079018f853e70dc26ac5080e79c5cd437cd3d5dca8c9c8617a691fcd97bd1def266edde2de22cbfa4cccd6350dbb5ebdec9654a06783b222e
-
SSDEEP
24576:CFJvj8ZE/OK1yhYcp/2111VD+7AB7L+KgyrrrrPrF0BMnlE6AE6nnjqKoep:C/qE/OEGh4ykODyFBnK6ejqKoep
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.code-jet.com - Port:
21 - Username:
[email protected] - Password:
Xec[t)4]dk2D
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newapp = "C:\\Users\\Admin\\AppData\\Roaming\\newapp\\newapp.exe" AddInProcess32.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 api.ipify.org 16 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
QUOTATION#231984.exedescription pid process target process PID 5052 set thread context of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
QUOTATION#231984.exepid process 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe 5052 QUOTATION#231984.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
QUOTATION#231984.exeAddInProcess32.exedescription pid process Token: SeDebugPrivilege 5052 QUOTATION#231984.exe Token: SeDebugPrivilege 2836 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AddInProcess32.exepid process 2836 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
QUOTATION#231984.exedescription pid process target process PID 5052 wrote to memory of 4660 5052 QUOTATION#231984.exe cvtres.exe PID 5052 wrote to memory of 4660 5052 QUOTATION#231984.exe cvtres.exe PID 5052 wrote to memory of 3656 5052 QUOTATION#231984.exe ngen.exe PID 5052 wrote to memory of 3656 5052 QUOTATION#231984.exe ngen.exe PID 5052 wrote to memory of 4688 5052 QUOTATION#231984.exe Microsoft.Workflow.Compiler.exe PID 5052 wrote to memory of 4688 5052 QUOTATION#231984.exe Microsoft.Workflow.Compiler.exe PID 5052 wrote to memory of 2660 5052 QUOTATION#231984.exe AppLaunch.exe PID 5052 wrote to memory of 2660 5052 QUOTATION#231984.exe AppLaunch.exe PID 5052 wrote to memory of 1456 5052 QUOTATION#231984.exe MSBuild.exe PID 5052 wrote to memory of 1456 5052 QUOTATION#231984.exe MSBuild.exe PID 5052 wrote to memory of 1228 5052 QUOTATION#231984.exe AddInProcess.exe PID 5052 wrote to memory of 1228 5052 QUOTATION#231984.exe AddInProcess.exe PID 5052 wrote to memory of 4500 5052 QUOTATION#231984.exe ServiceModelReg.exe PID 5052 wrote to memory of 4500 5052 QUOTATION#231984.exe ServiceModelReg.exe PID 5052 wrote to memory of 4036 5052 QUOTATION#231984.exe aspnet_regiis.exe PID 5052 wrote to memory of 4036 5052 QUOTATION#231984.exe aspnet_regiis.exe PID 5052 wrote to memory of 3696 5052 QUOTATION#231984.exe dfsvc.exe PID 5052 wrote to memory of 3696 5052 QUOTATION#231984.exe dfsvc.exe PID 5052 wrote to memory of 2068 5052 QUOTATION#231984.exe aspnet_state.exe PID 5052 wrote to memory of 2068 5052 QUOTATION#231984.exe aspnet_state.exe PID 5052 wrote to memory of 4272 5052 QUOTATION#231984.exe aspnet_regbrowsers.exe PID 5052 wrote to memory of 4272 5052 QUOTATION#231984.exe aspnet_regbrowsers.exe PID 5052 wrote to memory of 3132 5052 QUOTATION#231984.exe mscorsvw.exe PID 5052 wrote to memory of 3132 5052 QUOTATION#231984.exe mscorsvw.exe PID 5052 wrote to memory of 1112 5052 QUOTATION#231984.exe ngentask.exe PID 5052 wrote to memory of 1112 5052 QUOTATION#231984.exe ngentask.exe PID 5052 wrote to memory of 4392 5052 QUOTATION#231984.exe csc.exe PID 5052 wrote to memory of 4392 5052 QUOTATION#231984.exe csc.exe PID 5052 wrote to memory of 4372 5052 QUOTATION#231984.exe WsatConfig.exe PID 5052 wrote to memory of 4372 5052 QUOTATION#231984.exe WsatConfig.exe PID 5052 wrote to memory of 2604 5052 QUOTATION#231984.exe ilasm.exe PID 5052 wrote to memory of 2604 5052 QUOTATION#231984.exe ilasm.exe PID 5052 wrote to memory of 2992 5052 QUOTATION#231984.exe aspnet_regsql.exe PID 5052 wrote to memory of 2992 5052 QUOTATION#231984.exe aspnet_regsql.exe PID 5052 wrote to memory of 2976 5052 QUOTATION#231984.exe vbc.exe PID 5052 wrote to memory of 2976 5052 QUOTATION#231984.exe vbc.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe PID 5052 wrote to memory of 2836 5052 QUOTATION#231984.exe AddInProcess32.exe -
outlook_office_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION#231984.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION#231984.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:4660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:3656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:4688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:2660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:1456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"2⤵PID:1228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:4500
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:4036
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:3696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:2068
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:4272
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:3132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:1112
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:4392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:4372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:2992
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2836
-