Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
URGENT REQUEST FOR QUOTATION.exe
Resource
win10v2004-20240508-en
General
-
Target
URGENT REQUEST FOR QUOTATION.exe
-
Size
673KB
-
MD5
f00f7c52552aaf2410ff3082fa37daeb
-
SHA1
881b033d370728d7abd1b833517bf3c0cfc8d2c8
-
SHA256
8fb777d3216834be1787eb6b32f538983ba82ce75af5925d714036f8d70a2914
-
SHA512
b3d4ccaeb3dcf94962c529bd00ee5b2fe7f956215ef2fd71578e35e75c62a0ca4f466c72292c820ec1313c2fa819cff34e579f8d4151a0e5711b0c06e291d571
-
SSDEEP
12288:9fYifTnzq6udapuUZ1Z1rFAHPaoq2LLU2GlreaaDyco0wwkR:9Aiz0kpuUZ7UH9erWyoC
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 4064 powershell.exe 2212 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
URGENT REQUEST FOR QUOTATION.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation URGENT REQUEST FOR QUOTATION.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exedescription pid process target process PID 4684 set thread context of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exepowershell.exepowershell.exeRegSvcs.exepid process 4684 URGENT REQUEST FOR QUOTATION.exe 4684 URGENT REQUEST FOR QUOTATION.exe 4684 URGENT REQUEST FOR QUOTATION.exe 4684 URGENT REQUEST FOR QUOTATION.exe 4684 URGENT REQUEST FOR QUOTATION.exe 4684 URGENT REQUEST FOR QUOTATION.exe 4064 powershell.exe 2212 powershell.exe 4684 URGENT REQUEST FOR QUOTATION.exe 3244 RegSvcs.exe 3244 RegSvcs.exe 4064 powershell.exe 2212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4684 URGENT REQUEST FOR QUOTATION.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 3244 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
URGENT REQUEST FOR QUOTATION.exedescription pid process target process PID 4684 wrote to memory of 4064 4684 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 4684 wrote to memory of 4064 4684 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 4684 wrote to memory of 4064 4684 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 4684 wrote to memory of 2212 4684 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 4684 wrote to memory of 2212 4684 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 4684 wrote to memory of 2212 4684 URGENT REQUEST FOR QUOTATION.exe powershell.exe PID 4684 wrote to memory of 2312 4684 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 4684 wrote to memory of 2312 4684 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 4684 wrote to memory of 2312 4684 URGENT REQUEST FOR QUOTATION.exe schtasks.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe PID 4684 wrote to memory of 3244 4684 URGENT REQUEST FOR QUOTATION.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\URGENT REQUEST FOR QUOTATION.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sYntCeaVlYgp.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sYntCeaVlYgp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAB05.tmp"2⤵
- Creates scheduled task(s)
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD50bebc26fb9d2bf930f9b451fb1869aff
SHA13e1138c7ec406bf4572c1b36932e88aad735de9b
SHA2569aa5852455225907dff2652076c6b6c9aab041546a5b7ca8f76fa57429b0fd1a
SHA51267b175986230d1dbc99f959fe412120f516264cfcbcfc1e913466f07b680ac03388976bbdf7b01996eafdd9a37cf52931db016bc1fd49e4a8e5f624590303fee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD54c2e7b07a371fcfa29b2127f32b4ccd4
SHA143ed1e87a67363fa49cfe4e3037650dc520a6d02
SHA256a4d23684c1de92bb764f589588038c6ba9f50248f71c12cb7df0061bfb760aa8
SHA5129bf316a264642afaf2ed9de158208247dbf12eb8fa38d6f109c983e8e5764830e41399ea172d9e4dac206e2506e6c56d181187b7b767048f5f72fb7d6d15d6c5