Malware Analysis Report

2024-11-13 14:28

Sample ID 240603-ltyb1abg77
Target img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe
SHA256 ffdec1b87d247393a922973571b8bfa88219a418230abb916105b170e814950a
Tags
agenttesla keylogger spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ffdec1b87d247393a922973571b8bfa88219a418230abb916105b170e814950a

Threat Level: Known bad

The file img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe was found to be: Known bad.

Malicious Activity Summary

agenttesla keylogger spyware stealer trojan

AgentTesla

Looks up external IP address via web service

Suspicious use of SetThreadContext

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-03 09:50

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-03 09:50

Reported

2024-06-03 09:52

Platform

win7-20240508-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2400 set thread context of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
PID 2400 wrote to memory of 2896 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe

Processes

C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe

"C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 104.26.13.205:443 api.ipify.org tcp

Files

memory/2896-0-0x0000000000400000-0x0000000000440000-memory.dmp

memory/2896-2-0x0000000000400000-0x0000000000440000-memory.dmp

memory/2896-4-0x0000000000400000-0x0000000000440000-memory.dmp

memory/2896-5-0x0000000074C6E000-0x0000000074C6F000-memory.dmp

memory/2896-6-0x0000000074C60000-0x000000007534E000-memory.dmp

memory/2896-7-0x0000000074C6E000-0x0000000074C6F000-memory.dmp

memory/2896-8-0x0000000074C60000-0x000000007534E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-03 09:50

Reported

2024-06-03 09:52

Platform

win10v2004-20240508-en

Max time kernel

134s

Max time network

108s

Command Line

"C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1352 set thread context of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
PID 1352 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe

Processes

C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe

"C:\Users\Admin\AppData\Local\Temp\img_RFQ CHEM_REF - Aanbesteding - PROJECT 90016288247_pdf.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 203.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 api.ipify.org udp
US 104.26.13.205:443 api.ipify.org tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
NL 23.62.61.99:443 www.bing.com tcp
US 8.8.8.8:53 205.13.26.104.in-addr.arpa udp
US 8.8.8.8:53 99.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 mail.privateemail.com udp
US 198.54.122.135:587 mail.privateemail.com tcp
US 8.8.8.8:53 135.122.54.198.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 97.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 45.19.74.20.in-addr.arpa udp

Files

memory/4888-0-0x0000000000400000-0x0000000000440000-memory.dmp

memory/4888-1-0x00000000746BE000-0x00000000746BF000-memory.dmp

memory/4888-2-0x00000000059E0000-0x0000000005F84000-memory.dmp

memory/4888-3-0x0000000005640000-0x00000000056A6000-memory.dmp

memory/4888-4-0x00000000746B0000-0x0000000074E60000-memory.dmp

memory/4888-5-0x0000000006BA0000-0x0000000006BF0000-memory.dmp

memory/4888-6-0x0000000006C90000-0x0000000006D2C000-memory.dmp

memory/4888-7-0x0000000006DD0000-0x0000000006E62000-memory.dmp

memory/4888-8-0x0000000006D40000-0x0000000006D4A000-memory.dmp

memory/4888-9-0x00000000746BE000-0x00000000746BF000-memory.dmp

memory/4888-10-0x00000000746B0000-0x0000000074E60000-memory.dmp