Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
Quote_Q9555.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Quote_Q9555.exe
Resource
win10v2004-20240226-en
General
-
Target
Quote_Q9555.exe
-
Size
633KB
-
MD5
6a2aece437d528300a3e532d273ac3b4
-
SHA1
e35fecaa0f8851adb6a2a170bbad1956894c3454
-
SHA256
24565cd1781c0378bf33859bddd21713cf1b624d2ab697921341ffb2c995e456
-
SHA512
2c4565504de5926f1d59a0bf0daf35c3065bcae58734b7c6208bd4c538d9ad0b3d0d68b22ab0fe81e20ae747e86d4a623f7eb73d7c47dc78f519494fb8f0cfb7
-
SSDEEP
12288:KCGWa5WwYjdLFAgVAI+42uIucQOXmner3WrXjiH1mvv:NGyPBLFVAIF200dWXOVQ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mbarieservicesltd.com - Port:
587 - Username:
[email protected] - Password:
*o9H+18Q4%;M - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Quote_Q9555.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote_Q9555.exe Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote_Q9555.exe Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote_Q9555.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Quote_Q9555.exedescription pid process target process PID 2600 set thread context of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Quote_Q9555.exepowershell.exepowershell.exepid process 2600 Quote_Q9555.exe 2600 Quote_Q9555.exe 2600 Quote_Q9555.exe 2532 powershell.exe 2652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Quote_Q9555.exeQuote_Q9555.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2600 Quote_Q9555.exe Token: SeDebugPrivilege 2920 Quote_Q9555.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Quote_Q9555.exedescription pid process target process PID 2600 wrote to memory of 2652 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2652 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2652 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2652 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2532 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2532 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2532 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2532 2600 Quote_Q9555.exe powershell.exe PID 2600 wrote to memory of 2824 2600 Quote_Q9555.exe schtasks.exe PID 2600 wrote to memory of 2824 2600 Quote_Q9555.exe schtasks.exe PID 2600 wrote to memory of 2824 2600 Quote_Q9555.exe schtasks.exe PID 2600 wrote to memory of 2824 2600 Quote_Q9555.exe schtasks.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe PID 2600 wrote to memory of 2920 2600 Quote_Q9555.exe Quote_Q9555.exe -
outlook_office_path 1 IoCs
Processes:
Quote_Q9555.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote_Q9555.exe -
outlook_win_path 1 IoCs
Processes:
Quote_Q9555.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Quote_Q9555.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote_Q9555.exe"C:\Users\Admin\AppData\Local\Temp\Quote_Q9555.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Quote_Q9555.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WItwIZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WItwIZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9740.tmp"2⤵
- Creates scheduled task(s)
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\Quote_Q9555.exe"C:\Users\Admin\AppData\Local\Temp\Quote_Q9555.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD506b9cde78a049a00662cc15315c401a9
SHA13657379d1236557b2fc0a332a735bf4737b5c9cc
SHA256cacafe1a26cff77d687adba5f90e12be181055e0c4243ef488fa2f17b33a661a
SHA512512133536fa8aed1ac1f795c6f4279a1c9a78c812d6a114a55d37da94371ac2b9e64c105c574880825364efd4a85391e5b0fd59a040e6319128ca3259f7867d5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZT6BY2C5TCXXXT483W4K.temp
Filesize7KB
MD5f27da483d43a9819d031074b82da7994
SHA1a23405048001301b7511c70a99fd2649406ead37
SHA256a36da2ddf2d1a8e342e974322ed19bb3453e1f22b18a804465cfd345c65ead33
SHA512ec7a7ea68eeb3801eeeeec58abf423343bb0974a514a1c5b138c9d01cc793b6ae7b45ed3a7a884067c890486281a2bbf6cb79ca92e2a446e9698121d2e726eb3