Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 18:28
Behavioral task
behavioral1
Sample
Request for Quote - 6000412697.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Request for Quote - 6000412697.exe
Resource
win10v2004-20240802-en
General
-
Target
Request for Quote - 6000412697.exe
-
Size
680KB
-
MD5
dd20d2512dd9dbfc2dbed9563c6ea1d4
-
SHA1
7f6a2ee121e006a7bf049c1e63b51c0978e46947
-
SHA256
732bae130c34155713bda6f16636b2063e5e8e35864d0352b2f3f343fab645cb
-
SHA512
35bab27fb74ae1f1e5b996b4e0eb0986d7a626511c23ab394532d2a9d56d2472e7a2dbc9abcc965fc1f0e34d56992cc6c0cb303f3f9072ad4286eb2d7e20be0f
-
SSDEEP
6144:ENg5JHngPhIJeFA2eFAkhIk6mbYiAr5gmQ8b3LNMK5vfAqRXjb0roFBVLnWFby3s:EQJg0z2z0YiQRQ8qUnjcoFBVLWF2/
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral1/memory/1580-1-0x0000000001360000-0x0000000001410000-memory.dmp family_agenttesla behavioral1/memory/2604-11-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/2604-13-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/2604-17-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/2604-23-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/2604-19-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1580-2-0x00000000001F0000-0x0000000000206000-memory.dmp agile_net -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\FlYymhhr = "C:\\Users\\Admin\\AppData\\Roaming\\kElWegW\\dVBDS.exe" InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1580 set thread context of 2604 1580 Request for Quote - 6000412697.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request for Quote - 6000412697.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1580 Request for Quote - 6000412697.exe 1580 Request for Quote - 6000412697.exe 1580 Request for Quote - 6000412697.exe 2604 InstallUtil.exe 2604 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1580 Request for Quote - 6000412697.exe Token: SeDebugPrivilege 2604 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 PID 1580 wrote to memory of 2604 1580 Request for Quote - 6000412697.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Request for Quote - 6000412697.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quote - 6000412697.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2604
-