Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win10v2004-20240426-en
General
-
Target
URGENT REQUEST FOR QUOTATION.exe
-
Size
775KB
-
MD5
3fd59a26eb8f645ac1f88e2ec2a3137a
-
SHA1
eb5135dd863bcfefa4a8e9e2fbd686068d6354e4
-
SHA256
785b8115d62f971593bacb7ddf5e0f0fa03ad2d3a077b91c88de788ee83f62b9
-
SHA512
486d81f9f07bd156ad5f1bcf127e4484399f8d43d1a6cfb09919f0971b276477c8bb5e7debd43087739c8c462488804f299017a043916c88ffd2318ecf7559d0
-
SSDEEP
24576:IWtb3BEXqdGFXcEm5t3bpP0PHBU4Z1ZM3fyD:TZBEqGKEm5HEhT06D
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4. 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-29-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral1/memory/2516-31-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral1/memory/2516-28-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral1/memory/2516-25-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral1/memory/2516-23-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-29-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2516-31-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2516-28-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2516-25-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2516-23-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables referencing Windows vault credential objects. Observed in infostealers 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-29-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral1/memory/2516-31-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral1/memory/2516-28-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral1/memory/2516-25-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral1/memory/2516-23-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-29-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral1/memory/2516-31-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral1/memory/2516-28-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral1/memory/2516-25-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral1/memory/2516-23-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-29-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral1/memory/2516-31-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral1/memory/2516-28-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral1/memory/2516-25-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral1/memory/2516-23-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables referencing many file transfer clients. Observed in information stealers 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2516-29-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral1/memory/2516-31-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral1/memory/2516-28-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral1/memory/2516-25-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral1/memory/2516-23-0x0000000000400000-0x0000000000442000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2064 powershell.exe 2612 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exedescription pid process target process PID 1584 set thread context of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exeRegSvcs.exepowershell.exepowershell.exepid process 1584 URGENT REQUEST FOR QUOTATION.exe 1584 URGENT REQUEST FOR QUOTATION.exe 1584 URGENT REQUEST FOR QUOTATION.exe 1584 URGENT REQUEST FOR QUOTATION.exe 1584 URGENT REQUEST FOR QUOTATION.exe 1584 URGENT REQUEST FOR QUOTATION.exe 1584 URGENT REQUEST FOR QUOTATION.exe 2516 RegSvcs.exe 2516 RegSvcs.exe 2064 powershell.exe 2612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1584 URGENT REQUEST FOR QUOTATION.exe Token: SeDebugPrivilege 2516 RegSvcs.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exedescription pid process target process PID 1584 wrote to memory of 2064 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2064 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2064 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2064 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2612 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2612 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2612 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2612 1584 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 1584 wrote to memory of 2652 1584 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 1584 wrote to memory of 2652 1584 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 1584 wrote to memory of 2652 1584 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 1584 wrote to memory of 2652 1584 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 1584 wrote to memory of 2516 1584 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZYQQcPA.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZYQQcPA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp694E.tmp"2⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c5ba968d26452f3db91ea9c7737f3d85
SHA16d802f9201b62aca2a520f10541fa75d26862b1b
SHA256e01e67b7f29fa88bef7fc4286996f4644eb78f90a3f74fb865f1a5b1aa4c5fd6
SHA512b2171f600c0006628d19611d0a9cc20086a5c9b037232afcf5d386c87e41fa3a3047d948d4a8eb9b90ae20bf6eb6605ebb9f552be14b6390c8138564ba6c512d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD548b5300255838a8f48792beaebbedb5a
SHA12d86be178b7ab1cc1098acc783c96e0a0d353dc0
SHA256963a19b15d410d236c233e87ace9c8682563a46fa74555ba08bf6dd6d9fc9516
SHA512123779ebbfaca5130c233e29d4f032868e1a5781c0dd47f87da175df92362731a740b2c5a67fcb0065bd48532e55efd5a64cdfd25417018ec53ccdbdbf048545