Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
29/06/2023, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry_Specifications.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Inquiry_Specifications.exe
Resource
win10-20230621-en
Behavioral task
behavioral3
Sample
Inquiry_Specifications.exe
Resource
win10v2004-20230621-en
General
-
Target
Inquiry_Specifications.exe
-
Size
589KB
-
MD5
3e2eea13f28c03ad22f0bc5b2e697f36
-
SHA1
b09f33d0433fb28b47a9ad3af56b880410aea6cb
-
SHA256
be916bff213eaafdb32c19caa4c4f95181c4ff9cdf20ba3d99905a9c2360ab41
-
SHA512
720723dbb6a5e1f12fea7a6a9184b64068e66620d8ffc7cbc2f0a9a832c7644e3ed7ba3e9d662676e0ae02a97280e5fb4c20f31a57e3aa68109c21ddf6c3c7e3
-
SSDEEP
12288:1YUpZnmpdsU/HRYUHEWSU1Cm3Dv5lUvlNDQ194:1YhsA6UYU1C2NlUTQ1C
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5349655878:AAGnMhpzchQYN5RbZ88-w3gvA1SNsxWo7ts/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1032500962-593345068-3128969974-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry_Specifications.exe Key opened \REGISTRY\USER\S-1-5-21-1032500962-593345068-3128969974-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry_Specifications.exe Key opened \REGISTRY\USER\S-1-5-21-1032500962-593345068-3128969974-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry_Specifications.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 1168 2556 Inquiry_Specifications.exe 70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2556 Inquiry_Specifications.exe 2556 Inquiry_Specifications.exe 2872 powershell.exe 2872 powershell.exe 2872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2556 Inquiry_Specifications.exe Token: SeDebugPrivilege 1168 Inquiry_Specifications.exe Token: SeDebugPrivilege 2872 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1168 Inquiry_Specifications.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2872 2556 Inquiry_Specifications.exe 66 PID 2556 wrote to memory of 2872 2556 Inquiry_Specifications.exe 66 PID 2556 wrote to memory of 2872 2556 Inquiry_Specifications.exe 66 PID 2556 wrote to memory of 4308 2556 Inquiry_Specifications.exe 68 PID 2556 wrote to memory of 4308 2556 Inquiry_Specifications.exe 68 PID 2556 wrote to memory of 4308 2556 Inquiry_Specifications.exe 68 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 PID 2556 wrote to memory of 1168 2556 Inquiry_Specifications.exe 70 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1032500962-593345068-3128969974-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry_Specifications.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1032500962-593345068-3128969974-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquiry_Specifications.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry_Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry_Specifications.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Jxutrle.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Jxutrle" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4759.tmp"2⤵
- Creates scheduled task(s)
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\Inquiry_Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry_Specifications.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD5390af9af8b4a7433e3e1947d306cccf8
SHA1ca7a71a64719f72d684b8a461a2fcc40e38bedd9
SHA2567a77e62bcfe30637dcda7b0103c2978d9eb2ca9765d627caff7cc23a8efbe59d
SHA5129cf254055bea9877aa1304c9025bfc5b67e5dcceb9a31c004bc6e9be600d63662ae93bbc009bbb2dfdb3fd8172c7ce7802955a2065313575a0c38314803dcd21