Analysis
-
max time kernel
111s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION No.2400228341.pdf.exe
Resource
win7-20240705-en
General
-
Target
QUOTATION No.2400228341.pdf.exe
-
Size
608KB
-
MD5
690c1b65a6267d6d0b201ba46089aabc
-
SHA1
9eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
-
SHA256
244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
-
SHA512
cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a
-
SSDEEP
12288:foQyRAt8qF72zz4a5wbpkTPVNI8mQdd1lzRB6nC8OziDjmRkR:qm8qF7Gzp5waTPVNuIdnYC8OyCM
Malware Config
Extracted
asyncrat
0.5.8
2 MONEY
twart.myfirewall.org:14143
udn3BZ1Fqt3jtiZx
-
delay
30
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
@#Qwerty12345 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 4 IoCs
pid Process 2432 svchost.exe 2880 svchost.exe 2520 kxpzvj.exe 1988 kxpzvj.exe -
Loads dropped DLL 6 IoCs
pid Process 2172 cmd.exe 2172 cmd.exe 2432 svchost.exe 2360 powershell.exe 2360 powershell.exe 2520 kxpzvj.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 api.ipify.org 11 api.ipify.org -
pid Process 2360 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1772 set thread context of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 2432 set thread context of 2880 2432 svchost.exe 38 PID 2520 set thread context of 1988 2520 kxpzvj.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION No.2400228341.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxpzvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxpzvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION No.2400228341.pdf.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2996 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1728 QUOTATION No.2400228341.pdf.exe 2360 powershell.exe 2360 powershell.exe 2360 powershell.exe 2880 svchost.exe 1988 kxpzvj.exe 1988 kxpzvj.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1728 QUOTATION No.2400228341.pdf.exe Token: SeDebugPrivilege 2880 svchost.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 1988 kxpzvj.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1772 wrote to memory of 1728 1772 QUOTATION No.2400228341.pdf.exe 29 PID 1728 wrote to memory of 2640 1728 QUOTATION No.2400228341.pdf.exe 31 PID 1728 wrote to memory of 2640 1728 QUOTATION No.2400228341.pdf.exe 31 PID 1728 wrote to memory of 2640 1728 QUOTATION No.2400228341.pdf.exe 31 PID 1728 wrote to memory of 2640 1728 QUOTATION No.2400228341.pdf.exe 31 PID 1728 wrote to memory of 2172 1728 QUOTATION No.2400228341.pdf.exe 33 PID 1728 wrote to memory of 2172 1728 QUOTATION No.2400228341.pdf.exe 33 PID 1728 wrote to memory of 2172 1728 QUOTATION No.2400228341.pdf.exe 33 PID 1728 wrote to memory of 2172 1728 QUOTATION No.2400228341.pdf.exe 33 PID 2172 wrote to memory of 2996 2172 cmd.exe 36 PID 2172 wrote to memory of 2996 2172 cmd.exe 36 PID 2172 wrote to memory of 2996 2172 cmd.exe 36 PID 2172 wrote to memory of 2996 2172 cmd.exe 36 PID 2640 wrote to memory of 3032 2640 cmd.exe 35 PID 2640 wrote to memory of 3032 2640 cmd.exe 35 PID 2640 wrote to memory of 3032 2640 cmd.exe 35 PID 2640 wrote to memory of 3032 2640 cmd.exe 35 PID 2172 wrote to memory of 2432 2172 cmd.exe 37 PID 2172 wrote to memory of 2432 2172 cmd.exe 37 PID 2172 wrote to memory of 2432 2172 cmd.exe 37 PID 2172 wrote to memory of 2432 2172 cmd.exe 37 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2432 wrote to memory of 2880 2432 svchost.exe 38 PID 2880 wrote to memory of 1480 2880 svchost.exe 39 PID 2880 wrote to memory of 1480 2880 svchost.exe 39 PID 2880 wrote to memory of 1480 2880 svchost.exe 39 PID 2880 wrote to memory of 1480 2880 svchost.exe 39 PID 1480 wrote to memory of 2360 1480 cmd.exe 41 PID 1480 wrote to memory of 2360 1480 cmd.exe 41 PID 1480 wrote to memory of 2360 1480 cmd.exe 41 PID 1480 wrote to memory of 2360 1480 cmd.exe 41 PID 2360 wrote to memory of 2520 2360 powershell.exe 42 PID 2360 wrote to memory of 2520 2360 powershell.exe 42 PID 2360 wrote to memory of 2520 2360 powershell.exe 42 PID 2360 wrote to memory of 2520 2360 powershell.exe 42 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43 PID 2520 wrote to memory of 1988 2520 kxpzvj.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA209.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\kxpzvj.exe"' & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\kxpzvj.exe"'7⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\kxpzvj.exe"C:\Users\Admin\AppData\Local\Temp\kxpzvj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\kxpzvj.exe"C:\Users\Admin\AppData\Local\Temp\kxpzvj.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
787KB
MD565024845cc98cd27fe6fd1cde0b90e13
SHA1548a9f43848255a76b96d9617fce46216ce7cac2
SHA2563ea082cbf550dcc1c297441b6859a65c1a47587a9eec61121d6799984e679c2f
SHA512a41f91fdf28d3a46663a5ee29c2cff030876fbe458bb6f84c012fdc02641f5c21208beba17ff6e541ea48592ea53a7f4e62fe0f4de13442bf20c2ad1b4fa20a0
-
Filesize
154B
MD50cf64b3a3ae1e96a83e599864d109aef
SHA154affe5fd186dab0f924f4c1bda412a24ee33865
SHA256f811900494e4d3a51db13c654217ed929dbf388f332ce009c17cd9221ca58970
SHA5127a1266fb5ebcbf3ffddf2088bd843a39eb4b96f9aee2f4f2a78ab467716f4ec82b586a098713bf00cd822154327277447fe8532546414ccd33d4e8062d5bf040
-
Filesize
608KB
MD5690c1b65a6267d6d0b201ba46089aabc
SHA19eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
SHA256244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
SHA512cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a