Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION 22589092.pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
QUOTATION 22589092.pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
QUOTATION 22589092.pdf.exe
-
Size
707KB
-
MD5
337f191b6b135a5f86e7b79cd29ab42b
-
SHA1
cf9c3bd673010c18a6a87f98c0c39cb304e5cb4e
-
SHA256
189d17c7572c0ad248cdbda9fb1fae17fcb30d4bd61ac6497ecc184340869e3a
-
SHA512
340bfb956cd8ed391be6cd79b4fe570a66cd52a88fde83c4d34585fc1389655db67c8ad9077c3395f1deee520f37ef863506ac6f46796e527ebf087e58191e0f
-
SSDEEP
12288:uchAckjwxQ/0blzCfx2aPbTqzreKfeCPEUo05sHvAkJ4:lk9mlz2x2OoreK7Pa052oY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
MAIL.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QUOTATION 22589092.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QUOTATION 22589092.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QUOTATION 22589092.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2684 2972 QUOTATION 22589092.pdf.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2684 QUOTATION 22589092.pdf.exe 2684 QUOTATION 22589092.pdf.exe 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2684 QUOTATION 22589092.pdf.exe Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2648 2972 QUOTATION 22589092.pdf.exe 30 PID 2972 wrote to memory of 2648 2972 QUOTATION 22589092.pdf.exe 30 PID 2972 wrote to memory of 2648 2972 QUOTATION 22589092.pdf.exe 30 PID 2972 wrote to memory of 2648 2972 QUOTATION 22589092.pdf.exe 30 PID 2972 wrote to memory of 2676 2972 QUOTATION 22589092.pdf.exe 32 PID 2972 wrote to memory of 2676 2972 QUOTATION 22589092.pdf.exe 32 PID 2972 wrote to memory of 2676 2972 QUOTATION 22589092.pdf.exe 32 PID 2972 wrote to memory of 2676 2972 QUOTATION 22589092.pdf.exe 32 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 PID 2972 wrote to memory of 2684 2972 QUOTATION 22589092.pdf.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QUOTATION 22589092.pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 QUOTATION 22589092.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION 22589092.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION 22589092.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vdWUdVbk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vdWUdVbk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp57FF.tmp"2⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION 22589092.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION 22589092.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f62ff26b47f33a25247cb9b450eded6a
SHA1eb53bfb2e359d6bb749238538858d9812f5be20e
SHA25681f38e28d26f7c68f975d96a43c781b13d618ebd6ca333caa070d0d3934ff084
SHA5123f6473850d676845bae9bc04ef39204036f6f4c1a84e7a1e2668afa88e487c5ba8e7f5fe52b780cd91c461950517573f060009841d23f7f24022afaa8f4db524