Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION No.2400228341.pdf.exe
Resource
win7-20240705-en
General
-
Target
QUOTATION No.2400228341.pdf.exe
-
Size
608KB
-
MD5
690c1b65a6267d6d0b201ba46089aabc
-
SHA1
9eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
-
SHA256
244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
-
SHA512
cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a
-
SSDEEP
12288:foQyRAt8qF72zz4a5wbpkTPVNI8mQdd1lzRB6nC8OziDjmRkR:qm8qF7Gzp5waTPVNuIdnYC8OyCM
Malware Config
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@#Qwerty12345
Extracted
asyncrat
0.5.8
2 MONEY
twart.myfirewall.org:14143
udn3BZ1Fqt3jtiZx
-
delay
30
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@#Qwerty12345 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation QUOTATION No.2400228341.pdf.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2304 svchost.exe 3908 svchost.exe 4236 cxnjuo.exe 372 cxnjuo.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 api.ipify.org 69 api.ipify.org -
pid Process 3644 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4512 set thread context of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 2304 set thread context of 3908 2304 svchost.exe 106 PID 4236 set thread context of 372 4236 cxnjuo.exe 120 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxnjuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION No.2400228341.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION No.2400228341.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxnjuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3640 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 4984 QUOTATION No.2400228341.pdf.exe 3644 powershell.exe 3644 powershell.exe 3908 svchost.exe 372 cxnjuo.exe 372 cxnjuo.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4984 QUOTATION No.2400228341.pdf.exe Token: SeDebugPrivilege 3908 svchost.exe Token: SeDebugPrivilege 3644 powershell.exe Token: SeDebugPrivilege 372 cxnjuo.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4512 wrote to memory of 4984 4512 QUOTATION No.2400228341.pdf.exe 93 PID 4984 wrote to memory of 1480 4984 QUOTATION No.2400228341.pdf.exe 99 PID 4984 wrote to memory of 1480 4984 QUOTATION No.2400228341.pdf.exe 99 PID 4984 wrote to memory of 1480 4984 QUOTATION No.2400228341.pdf.exe 99 PID 4984 wrote to memory of 3420 4984 QUOTATION No.2400228341.pdf.exe 101 PID 4984 wrote to memory of 3420 4984 QUOTATION No.2400228341.pdf.exe 101 PID 4984 wrote to memory of 3420 4984 QUOTATION No.2400228341.pdf.exe 101 PID 3420 wrote to memory of 3640 3420 cmd.exe 104 PID 3420 wrote to memory of 3640 3420 cmd.exe 104 PID 3420 wrote to memory of 3640 3420 cmd.exe 104 PID 1480 wrote to memory of 4076 1480 cmd.exe 103 PID 1480 wrote to memory of 4076 1480 cmd.exe 103 PID 1480 wrote to memory of 4076 1480 cmd.exe 103 PID 3420 wrote to memory of 2304 3420 cmd.exe 105 PID 3420 wrote to memory of 2304 3420 cmd.exe 105 PID 3420 wrote to memory of 2304 3420 cmd.exe 105 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 2304 wrote to memory of 3908 2304 svchost.exe 106 PID 3908 wrote to memory of 3300 3908 svchost.exe 108 PID 3908 wrote to memory of 3300 3908 svchost.exe 108 PID 3908 wrote to memory of 3300 3908 svchost.exe 108 PID 3300 wrote to memory of 3644 3300 cmd.exe 110 PID 3300 wrote to memory of 3644 3300 cmd.exe 110 PID 3300 wrote to memory of 3644 3300 cmd.exe 110 PID 3644 wrote to memory of 4236 3644 powershell.exe 111 PID 3644 wrote to memory of 4236 3644 powershell.exe 111 PID 3644 wrote to memory of 4236 3644 powershell.exe 111 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120 PID 4236 wrote to memory of 372 4236 cxnjuo.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp55BC.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\cxnjuo.exe"' & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\cxnjuo.exe"'7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\cxnjuo.exe"C:\Users\Admin\AppData\Local\Temp\cxnjuo.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\cxnjuo.exe"C:\Users\Admin\AppData\Local\Temp\cxnjuo.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57cad59aef5a93f093b6ba494f13f796f
SHA13cef97b77939bfc06dfd3946fc1a8cd159f67100
SHA2561e1b444fe2d8772f6709b22b94bb5b0aa7fa590f6a693705d9bf1f2f71267a55
SHA5128cedd03efec34c6226a01fd6b4831a689be16545ea6b849cd96f775e0722bfefd4b47f3dd8401d2080d341d4319f75995ece60de44352a1f86a2e5dc01e6210b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
787KB
MD565024845cc98cd27fe6fd1cde0b90e13
SHA1548a9f43848255a76b96d9617fce46216ce7cac2
SHA2563ea082cbf550dcc1c297441b6859a65c1a47587a9eec61121d6799984e679c2f
SHA512a41f91fdf28d3a46663a5ee29c2cff030876fbe458bb6f84c012fdc02641f5c21208beba17ff6e541ea48592ea53a7f4e62fe0f4de13442bf20c2ad1b4fa20a0
-
Filesize
608KB
MD5690c1b65a6267d6d0b201ba46089aabc
SHA19eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
SHA256244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
SHA512cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a
-
Filesize
154B
MD56f3f3e5dfd003459aafe57b88c58a07a
SHA131fa0fd8797e4fb0bc3d6c3402cab9eebcf4bc0f
SHA2566fbc713904a3df0137310e57278d907d7c14ab0e560faa109207a76aea89f6b0
SHA5124fae627b564c8359fb580b7412ec3a1270756985dffb0d8e4b5692763507d40d49d18b66203085231ebe6c7ceefc7faf74afb9d97848d801a68af71a2965ae9b