Analysis
-
max time kernel
26s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 16:33
Static task
static1
Behavioral task
behavioral1
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win10v2004-20231127-en
General
-
Target
URGENT REQUEST FOR QUOTATION.exe
-
Size
645KB
-
MD5
713ecfa2ce41e3edee829b9a4f9b5c74
-
SHA1
c23cf057a296df55472ceaab86bc9637cfea0f2d
-
SHA256
3af8e8d96431992127c5774977cb7b3ea300c4ef8b23a620f0213f42b79584d9
-
SHA512
9903dde3c8cc3fd7f945661f62afdecd06a391a895f6ba784395b911321e83f16e678b5c601b73416e1b3235d22ceaa5323eacc94afc609ff5db6c88d08606bf
-
SSDEEP
12288:2kvQaueH5qi/Uqiwq7ay1Lc2wlyoVnqC52sour7aMvi:2ktqi/tiwquy19QyoVXQhurP
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.precise.co.in - Port:
587 - Username:
[email protected] - Password:
Singh@2022$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2196 URGENT REQUEST FOR QUOTATION.exe 2196 URGENT REQUEST FOR QUOTATION.exe 2196 URGENT REQUEST FOR QUOTATION.exe 2196 URGENT REQUEST FOR QUOTATION.exe 2196 URGENT REQUEST FOR QUOTATION.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2196 URGENT REQUEST FOR QUOTATION.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2072 2196 URGENT REQUEST FOR QUOTATION.exe 35 PID 2196 wrote to memory of 2072 2196 URGENT REQUEST FOR QUOTATION.exe 35 PID 2196 wrote to memory of 2072 2196 URGENT REQUEST FOR QUOTATION.exe 35 PID 2196 wrote to memory of 2072 2196 URGENT REQUEST FOR QUOTATION.exe 35 PID 2196 wrote to memory of 2800 2196 URGENT REQUEST FOR QUOTATION.exe 34 PID 2196 wrote to memory of 2800 2196 URGENT REQUEST FOR QUOTATION.exe 34 PID 2196 wrote to memory of 2800 2196 URGENT REQUEST FOR QUOTATION.exe 34 PID 2196 wrote to memory of 2800 2196 URGENT REQUEST FOR QUOTATION.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2592
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kVbSXFovGp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7687.tmp"2⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kVbSXFovGp.exe"2⤵PID:2800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"2⤵PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5def26a244b94d8358494cbf42c7d30d2
SHA1e8b826e4051488b44930e440dfd9d63ac8ce8b37
SHA2567e4fee271b1b8864a8c71e96d7ee31c04db109c47d81c62cdb9243619c158bd5
SHA51241dccc5bcfe7d0e86db949b9902ecb2e743b49aeb77c4a3f4dfad44fc11783175bc8f39f62a7d1376bed028ad01a259cc76d110c9299bd62c656610df035eb9e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A5P1A5H2TVRL9Q2EI0CI.temp
Filesize7KB
MD5d4cf468a7eaf9fce227a96ff820bc428
SHA1699f7c61ecbfab0cf8b949ed0e2f36e45de4b7cc
SHA256290728b1d07e347fc6e90de876bdabccae626e81fd6d5043f948b796e03dd37d
SHA5129f6c553460fb581d3bb50fc95c18082d2b66b2c9913b6f4d1d5d8fa183a624ddd86ccb87fe1d63ed2395c5db59f7d9ca1074712d9f6810e21e5f4d44683ff425
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d4cf468a7eaf9fce227a96ff820bc428
SHA1699f7c61ecbfab0cf8b949ed0e2f36e45de4b7cc
SHA256290728b1d07e347fc6e90de876bdabccae626e81fd6d5043f948b796e03dd37d
SHA5129f6c553460fb581d3bb50fc95c18082d2b66b2c9913b6f4d1d5d8fa183a624ddd86ccb87fe1d63ed2395c5db59f7d9ca1074712d9f6810e21e5f4d44683ff425