Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 01:13
Static task
static1
Behavioral task
behavioral1
Sample
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
Resource
win10v2004-20231127-en
General
-
Target
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
-
Size
403KB
-
MD5
c081e925d1f5ffa3057680b76e354141
-
SHA1
fe2a4b9d382fffe418d34d101785ce7a787c6aa0
-
SHA256
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8
-
SHA512
14c554c4c2bccb5ce9299f4cbdf1bd1fd318d4e37ad77cbbf765ae04b539a896c33050c399cc0357ac74e3893a54805d5b2ceffbf5bc32ae4ecdb6b80b6ed6ae
-
SSDEEP
12288:D94/XlCUvQt1apQ7ERtLJ7N/vMmbCH/a9:DO5vzpvLJ7N3vCHS9
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2772 iqqsmqf.exe 2804 iqqsmqf.exe -
Loads dropped DLL 3 IoCs
pid Process 2252 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe 2252 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe 2772 iqqsmqf.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 2804 2772 iqqsmqf.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 iqqsmqf.exe 2804 iqqsmqf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2772 iqqsmqf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 iqqsmqf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2772 2252 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe 28 PID 2252 wrote to memory of 2772 2252 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe 28 PID 2252 wrote to memory of 2772 2252 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe 28 PID 2252 wrote to memory of 2772 2252 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe 28 PID 2772 wrote to memory of 2804 2772 iqqsmqf.exe 30 PID 2772 wrote to memory of 2804 2772 iqqsmqf.exe 30 PID 2772 wrote to memory of 2804 2772 iqqsmqf.exe 30 PID 2772 wrote to memory of 2804 2772 iqqsmqf.exe 30 PID 2772 wrote to memory of 2804 2772 iqqsmqf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe"C:\Users\Admin\AppData\Local\Temp\01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
333KB
MD56b1c08140286d7333b668a0d387dfeb0
SHA146f2b3da75af49e6daede57d362102564c6c525d
SHA25645e0101d414ac7f6378f1f39e63a1907aa1c1c7d8d74dea58ed9b3d54dad9644
SHA51280d130300da51896d920b9bb17168d3a84d66c517c7523084c1727aed12199602a2d37702aedf2b529af6ccfd4da7d9d03602a988be0d54abf94d58c9f73596a
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15