Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 14:57
Static task
static1
Behavioral task
behavioral1
Sample
RLIC RFQ FOR CHAIN LINK FENCE.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
RLIC RFQ FOR CHAIN LINK FENCE.exe
Resource
win10v2004-20231023-en
General
-
Target
RLIC RFQ FOR CHAIN LINK FENCE.exe
-
Size
720KB
-
MD5
5e6e12f469bfbccccc8230e0b273af46
-
SHA1
c47f43a407ded9fcf8c2e8c77231f8ee3f719f1f
-
SHA256
555c988f8053478d8dfa7aa879a1ffb483fb4a30c32eee979c9ea82dcb489197
-
SHA512
3df37aafb586d121988af555fff491b3a4c20c12f596b0ae9cd4411e01175744525f05fedf91961abd3166fc3ced3735086d3e715fdabe32801227cd03ba10a1
-
SSDEEP
12288:1fyqTX/MaLX00zFTu7Xq2BS1fagiBohSdAk620NX1roRJ:tnz566BfagiBoSdAk62gXqRJ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
business62.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
[email protected] - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Run\lBaCsk = "C:\\Users\\Admin\\AppData\\Roaming\\lBaCsk\\lBaCsk.exe" InstallUtil.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2952 set thread context of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 2968 InstallUtil.exe 2968 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe Token: SeDebugPrivilege 2968 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 PID 2952 wrote to memory of 2968 2952 RLIC RFQ FOR CHAIN LINK FENCE.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RLIC RFQ FOR CHAIN LINK FENCE.exe"C:\Users\Admin\AppData\Local\Temp\RLIC RFQ FOR CHAIN LINK FENCE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2968
-