Analysis
-
max time kernel
74s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2023 15:59
Static task
static1
Behavioral task
behavioral1
Sample
Quote #9773410658.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
Quote #9773410658.exe
Resource
win10v2004-20230703-en
General
-
Target
Quote #9773410658.exe
-
Size
625KB
-
MD5
f56a805d465621f776501a8cb84e3cca
-
SHA1
952bcf78947786b7bb4a99844328cf108e8f14c2
-
SHA256
f47b5a1548d7d1ecf22e19ea995bb81111132ab5543037903f59acc83316fa1c
-
SHA512
8b60a5cf4a8057ebdbdbf6943dfded7772643a65f4656d1de1ef11de02abdba36567d2442d0396f8bbaa1d6fef85e393bb503c421adf90108b2a103a13a91c97
-
SSDEEP
12288:fc5q6PbUZ471ebOzQjoKQzgoq1gE7qzeP9Z1tsYK+OnY2:SqVZE0bO0cx0lgZA9Z1+Z
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.icmpp.ro - Port:
587 - Username:
[email protected] - Password:
puCHImic2019 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote #9773410658.exe Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote #9773410658.exe Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote #9773410658.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows\CurrentVersion\Run\AOkCt = "C:\\Users\\Admin\\AppData\\Roaming\\AOkCt\\AOkCt.exe" Quote #9773410658.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 1772 3052 Quote #9773410658.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3052 Quote #9773410658.exe 3052 Quote #9773410658.exe 3052 Quote #9773410658.exe 3052 Quote #9773410658.exe 2092 powershell.exe 1772 Quote #9773410658.exe 1772 Quote #9773410658.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3052 Quote #9773410658.exe Token: SeDebugPrivilege 1772 Quote #9773410658.exe Token: SeDebugPrivilege 2092 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2092 3052 Quote #9773410658.exe 28 PID 3052 wrote to memory of 2092 3052 Quote #9773410658.exe 28 PID 3052 wrote to memory of 2092 3052 Quote #9773410658.exe 28 PID 3052 wrote to memory of 2092 3052 Quote #9773410658.exe 28 PID 3052 wrote to memory of 1680 3052 Quote #9773410658.exe 30 PID 3052 wrote to memory of 1680 3052 Quote #9773410658.exe 30 PID 3052 wrote to memory of 1680 3052 Quote #9773410658.exe 30 PID 3052 wrote to memory of 1680 3052 Quote #9773410658.exe 30 PID 3052 wrote to memory of 2148 3052 Quote #9773410658.exe 32 PID 3052 wrote to memory of 2148 3052 Quote #9773410658.exe 32 PID 3052 wrote to memory of 2148 3052 Quote #9773410658.exe 32 PID 3052 wrote to memory of 2148 3052 Quote #9773410658.exe 32 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 PID 3052 wrote to memory of 1772 3052 Quote #9773410658.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote #9773410658.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote #9773410658.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote #9773410658.exe"C:\Users\Admin\AppData\Local\Temp\Quote #9773410658.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dcjIObDp.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dcjIObDp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp484.tmp"2⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\Quote #9773410658.exe"C:\Users\Admin\AppData\Local\Temp\Quote #9773410658.exe"2⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\Quote #9773410658.exe"C:\Users\Admin\AppData\Local\Temp\Quote #9773410658.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD507989f96f87cb81b5acdf077d1b19784
SHA18d9c4a01ad784e3d97e30469baaa50c7b8423a9e
SHA25679d02de5f6756caa10c528d54530b8f9b28808a963abd0fd567889232bdbef35
SHA512aa77811706c64d5da1c48828d8ed344d807bc630416afc23f2a7bafbc7d96fefc9f9b2b8725e48c0c3bb5b7d71530b032a9e14b0c0513a63848d6827ca643a41