Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2023 01:13
Static task
static1
Behavioral task
behavioral1
Sample
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
Resource
win10v2004-20231127-en
General
-
Target
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe
-
Size
403KB
-
MD5
c081e925d1f5ffa3057680b76e354141
-
SHA1
fe2a4b9d382fffe418d34d101785ce7a787c6aa0
-
SHA256
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8
-
SHA512
14c554c4c2bccb5ce9299f4cbdf1bd1fd318d4e37ad77cbbf765ae04b539a896c33050c399cc0357ac74e3893a54805d5b2ceffbf5bc32ae4ecdb6b80b6ed6ae
-
SSDEEP
12288:D94/XlCUvQt1apQ7ERtLJ7N/vMmbCH/a9:DO5vzpvLJ7N3vCHS9
Malware Config
Extracted
Protocol: ftp- Host:
ftp.siscop.com.co - Port:
21 - Username:
[email protected] - Password:
+5s48Ia2&-(t
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
Processes:
iqqsmqf.exeiqqsmqf.exepid process 2696 iqqsmqf.exe 5020 iqqsmqf.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
iqqsmqf.exedescription pid process target process PID 2696 set thread context of 5020 2696 iqqsmqf.exe iqqsmqf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
iqqsmqf.exepid process 5020 iqqsmqf.exe 5020 iqqsmqf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
iqqsmqf.exepid process 2696 iqqsmqf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
iqqsmqf.exedescription pid process Token: SeDebugPrivilege 5020 iqqsmqf.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exeiqqsmqf.exedescription pid process target process PID 4944 wrote to memory of 2696 4944 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe iqqsmqf.exe PID 4944 wrote to memory of 2696 4944 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe iqqsmqf.exe PID 4944 wrote to memory of 2696 4944 01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe iqqsmqf.exe PID 2696 wrote to memory of 5020 2696 iqqsmqf.exe iqqsmqf.exe PID 2696 wrote to memory of 5020 2696 iqqsmqf.exe iqqsmqf.exe PID 2696 wrote to memory of 5020 2696 iqqsmqf.exe iqqsmqf.exe PID 2696 wrote to memory of 5020 2696 iqqsmqf.exe iqqsmqf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe"C:\Users\Admin\AppData\Local\Temp\01a9921402a5f16927078fb894525739afc8dd141cc78c94b0a6e6c57651cfd8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"C:\Users\Admin\AppData\Local\Temp\iqqsmqf.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
165KB
MD59bfe9255e6c071d5085cb8fe04470d4d
SHA18bbdac8c049f4c0ca91f54b68a845c53cd4c1169
SHA256842c0f3848a212cdb1ee71bb2a0922fea7f0ee1b9a27abbe7848954685d2fd1e
SHA512e416fc348e088085b794fc798dcbe60f34537aac957853e39b838dca5693a4ad1046a5e4e56dee5e833cab564f83e4fe90874cb69a43a55995feb4b5862f2b15
-
Filesize
333KB
MD56b1c08140286d7333b668a0d387dfeb0
SHA146f2b3da75af49e6daede57d362102564c6c525d
SHA25645e0101d414ac7f6378f1f39e63a1907aa1c1c7d8d74dea58ed9b3d54dad9644
SHA51280d130300da51896d920b9bb17168d3a84d66c517c7523084c1727aed12199602a2d37702aedf2b529af6ccfd4da7d9d03602a988be0d54abf94d58c9f73596a