Analysis

  • max time kernel
    105s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 08:14

General

  • Target

    Quotation#[email protected]

  • Size

    889KB

  • MD5

    98d9d150c0b4afc30efd34c22e176f56

  • SHA1

    ba286afad44a3f4f514aff7f1dca1c159f8cbec0

  • SHA256

    c9c89543724cc2517b6f7a873f9c33cc055c237829c65a268dbdf64a21b4dd95

  • SHA512

    8f03ca7edaebc084f20609f8005b85d8a0fc5d18187f67179b6799dd9c5c337a9584714bbafe9eedf6dbc405787b38b3fdbef723590fd16a4da7ab9b0571ca31

  • SSDEEP

    24576:WyBtjmCojfzv3J3LTT3onKLMplOBLG6+:J72fzv3ZbT0l

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ikechukwu123456789

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ikechukwu123456789

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation#[email protected]
    "C:\Users\Admin\AppData\Local\Temp\Quotation#[email protected]"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OxswKUOe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4D8E.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2448
    • C:\Users\Admin\AppData\Local\Temp\Quotation#[email protected]
      "{path}"
      2⤵
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation#[email protected]

    Filesize

    412B

    MD5

    e72888b5960716cf170f3e1becd14370

    SHA1

    0aeefd2d4a7948a03aad625ca86fc34d79adf248

    SHA256

    8317f594f74040b50e1b88f4aba5e6da3423bf47fe91df59e6e85f37b1f7e0ab

    SHA512

    9cdfda6fc4f324dfd8d53b46610114252431a5d26296a6f3d606b8ffeef172263fbde9ce0a1b2b9232dabcdabd33d6677e9a5f7693b175f24cea622c31b5c6b7

  • C:\Users\Admin\AppData\Local\Temp\tmp4D8E.tmp

    Filesize

    1KB

    MD5

    d1f952ff4202dda30af5aa95175b0e0b

    SHA1

    31fda287e3125cc57c19243d572a3d6442316eb3

    SHA256

    47d55d14c3c28633f71ae302325b4683ea8b7a6e5364dff775935796803a9544

    SHA512

    c9ee2569fb8fdf0e86ef497099875547a72f3342bf5fa81b9cb0c2e7e49e9202e89a187a4a309164441adf877265f252c2ed6691c3800a80e844e4074cd56901

  • memory/2276-16-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-1-0x0000000000B00000-0x0000000000BE4000-memory.dmp

    Filesize

    912KB

  • memory/2276-2-0x0000000005570000-0x000000000560C000-memory.dmp

    Filesize

    624KB

  • memory/2276-3-0x0000000005540000-0x0000000005552000-memory.dmp

    Filesize

    72KB

  • memory/2276-4-0x0000000005720000-0x00000000057B2000-memory.dmp

    Filesize

    584KB

  • memory/2276-5-0x000000007446E000-0x000000007446F000-memory.dmp

    Filesize

    4KB

  • memory/2276-6-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB

  • memory/2276-7-0x0000000005D40000-0x0000000005DE2000-memory.dmp

    Filesize

    648KB

  • memory/2276-8-0x00000000082E0000-0x0000000008378000-memory.dmp

    Filesize

    608KB

  • memory/2276-0-0x000000007446E000-0x000000007446F000-memory.dmp

    Filesize

    4KB

  • memory/4988-12-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/4988-15-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB

  • memory/4988-17-0x0000000005D60000-0x0000000006304000-memory.dmp

    Filesize

    5.6MB

  • memory/4988-18-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB

  • memory/4988-19-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB

  • memory/4988-20-0x0000000005CE0000-0x0000000005CF8000-memory.dmp

    Filesize

    96KB

  • memory/4988-21-0x00000000065C0000-0x0000000006626000-memory.dmp

    Filesize

    408KB

  • memory/4988-22-0x0000000006B60000-0x0000000006BB0000-memory.dmp

    Filesize

    320KB

  • memory/4988-23-0x0000000006F50000-0x0000000006F5A000-memory.dmp

    Filesize

    40KB

  • memory/4988-24-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB

  • memory/4988-25-0x0000000074460000-0x0000000074C10000-memory.dmp

    Filesize

    7.7MB