Analysis
-
max time kernel
29s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 16:33
Static task
static1
Behavioral task
behavioral1
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win10v2004-20231127-en
General
-
Target
URGENT REQUEST FOR QUOTATION.exe
-
Size
645KB
-
MD5
713ecfa2ce41e3edee829b9a4f9b5c74
-
SHA1
c23cf057a296df55472ceaab86bc9637cfea0f2d
-
SHA256
3af8e8d96431992127c5774977cb7b3ea300c4ef8b23a620f0213f42b79584d9
-
SHA512
9903dde3c8cc3fd7f945661f62afdecd06a391a895f6ba784395b911321e83f16e678b5c601b73416e1b3235d22ceaa5323eacc94afc609ff5db6c88d08606bf
-
SSDEEP
12288:2kvQaueH5qi/Uqiwq7ay1Lc2wlyoVnqC52sour7aMvi:2ktqi/tiwquy19QyoVXQhurP
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.precise.co.in - Port:
587 - Username:
[email protected] - Password:
Singh@2022$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3748 3344 WerFault.exe 107 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 112 URGENT REQUEST FOR QUOTATION.exe 112 URGENT REQUEST FOR QUOTATION.exe 112 URGENT REQUEST FOR QUOTATION.exe 112 URGENT REQUEST FOR QUOTATION.exe 112 URGENT REQUEST FOR QUOTATION.exe 112 URGENT REQUEST FOR QUOTATION.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 112 URGENT REQUEST FOR QUOTATION.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kVbSXFovGp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF760.tmp"2⤵
- Creates scheduled task(s)
PID:2868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 14563⤵
- Program crash
PID:3748
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kVbSXFovGp.exe"2⤵PID:4036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"2⤵PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3344 -ip 33441⤵PID:4884
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3100
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:64
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD543fd9bf71e8957a87d229a8cc5569c9a
SHA125b1f9d7b88db58e2aa8fab439fced64551952a0
SHA25630344123bfe0d1d90ac49dce790b211878aa512d446d0c405985c633dbc9a0e5
SHA51275202f5414b41d425bf6af4d154cd40085ff7b6049babe6deaa96b27b44ebbec45f59c06326276f379c1f94279a35ced0a72bdcdfa4a552e3a0611c8f17809fd
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD538e6df5b03e5fcf709b8a0a5052b8cc2
SHA1af83f0ce2a46f4d87508e6d53e59edbf24de454c
SHA2562eada162d7329f44e8cbe908bd9a561856b984ca4d2f82e15c881c514a29e0a3
SHA512f56616ad46c933b69d2f7ab52f0d1e696e2669dd415ff34acc219156b764ce684ef20f8dc3356a152567b875ee7c41a56a270380529d1dfa62d81e8d70acac4e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD58b9783e2fd1f11b33c697256917122a4
SHA1fb951300a9467549f7c4240c0b3ade2b153fc656
SHA256b1b320b2e873d467d6d7c3277412bc2c86abf3e26e4952603933ae406e6c7971
SHA5129a254d87c11ff5d959b01dbca85b76c751edc690ffffb8bd4951553213c0571f9a5dc0aa7829fab546d7014d967e5a8d9ca39e078ab8f9309620bb8889218868