Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2023, 07:51

General

  • Target

    QUOTATION#00865.exe

  • Size

    3.1MB

  • MD5

    1fbcd56c055b85eca05232a0703b132b

  • SHA1

    01e24d6265142c4fbcefaaf39738c3f44b59d31b

  • SHA256

    fc2c64880d94d3b09871ba942db34f781b8f26a4bce3f177ff6383f728f3e42a

  • SHA512

    08f5dfc2a635e9fcace20b393a9b45d4a1d53866cf8df77f0500a074042e242cb0d16cd057319397b1b080db61118c02c5b770e3442aacbe34066951cbe450b1

  • SSDEEP

    49152:Z0Fng4F/H3k1X3iR9LvjdHiJKSZDRJS2PiRR7Cp5FiK:E/HNGKSZDWe

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    e2{!tG9K(4HG

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.ercolina-usa.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    e2{!tG9K(4HG

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTATION#00865.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTATION#00865.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
        PID:880
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        2⤵
          PID:2536
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          2⤵
            PID:1596
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3812

        Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1032-11-0x0000000074F40000-0x00000000756F0000-memory.dmp

                Filesize

                7.7MB

              • memory/1032-0-0x0000000074F40000-0x00000000756F0000-memory.dmp

                Filesize

                7.7MB

              • memory/1032-2-0x0000000005580000-0x0000000005B24000-memory.dmp

                Filesize

                5.6MB

              • memory/1032-3-0x0000000004EF0000-0x0000000004F82000-memory.dmp

                Filesize

                584KB

              • memory/1032-4-0x0000000004FD0000-0x000000000506C000-memory.dmp

                Filesize

                624KB

              • memory/1032-5-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

                Filesize

                64KB

              • memory/1032-6-0x0000000005220000-0x00000000053BA000-memory.dmp

                Filesize

                1.6MB

              • memory/1032-7-0x0000000004EA0000-0x0000000004EBA000-memory.dmp

                Filesize

                104KB

              • memory/1032-1-0x00000000001B0000-0x00000000004C4000-memory.dmp

                Filesize

                3.1MB

              • memory/3812-8-0x0000000000400000-0x0000000000470000-memory.dmp

                Filesize

                448KB

              • memory/3812-10-0x0000000074F40000-0x00000000756F0000-memory.dmp

                Filesize

                7.7MB

              • memory/3812-12-0x0000000005700000-0x0000000005710000-memory.dmp

                Filesize

                64KB

              • memory/3812-13-0x0000000005790000-0x00000000057F6000-memory.dmp

                Filesize

                408KB

              • memory/3812-14-0x00000000066A0000-0x00000000066F0000-memory.dmp

                Filesize

                320KB

              • memory/3812-15-0x0000000007000000-0x000000000700A000-memory.dmp

                Filesize

                40KB

              • memory/3812-16-0x0000000074F40000-0x00000000756F0000-memory.dmp

                Filesize

                7.7MB