Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
Disab RFQ.exe
Resource
win7-20240903-en
General
-
Target
Disab RFQ.exe
-
Size
186KB
-
MD5
ebce0a20c122505799e5e1569be59e2e
-
SHA1
fb8b81cfbeadadb1d8e4d8b73ad617e501dd9b23
-
SHA256
efa2b4bc11dad2f4e20dad65bab3cac046a7ae4190576686aee80e8c9dd0f86f
-
SHA512
a58ceffc7912d30132072773f59f24dc92fe28283441b3e0bb53d415f1d01baa3a3db113bdbc4ebc666fa9c8eaf96bfcc1b503b9ac9fc99df0b90b32e432bb48
-
SSDEEP
3072:p/n1G9evqEB5pB20ESaH8cywXWZ2dQFVHiG1aDDrxVWjKdemlgxq5kV/C0xF/K83:l1G9ePESaH8cywXWZ2dQFBiG1aDDrxVk
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.al-subai.com - Port:
587 - Username:
[email protected] - Password:
information12 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3660 created 3512 3660 Disab RFQ.exe 56 -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.ipify.org 30 api.ipify.org 31 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 4296 3660 Disab RFQ.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Disab RFQ.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3660 Disab RFQ.exe 4296 MSBuild.exe 4296 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3660 Disab RFQ.exe Token: SeDebugPrivilege 3660 Disab RFQ.exe Token: SeDebugPrivilege 4296 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89 PID 3660 wrote to memory of 4296 3660 Disab RFQ.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\Disab RFQ.exe"C:\Users\Admin\AppData\Local\Temp\Disab RFQ.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-