Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 01:16
Static task
static1
Behavioral task
behavioral1
Sample
MACHINE QUOTATION/MACHINE QUOTATION.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
MACHINE QUOTATION/tedutil.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
MACHINE QUOTATION/tedutil.dll
Resource
win10v2004-20241007-en
General
-
Target
MACHINE QUOTATION/tedutil.dll
-
Size
14.1MB
-
MD5
f5d36baa964bd1f219483fbd39013d97
-
SHA1
09d2ba088ce0982a09f59615cd4622ff83055a8d
-
SHA256
290a36d8428ef6694919b9aeb575003cb1ed58a80b716bb270a578b37ff15926
-
SHA512
993696e0f0f41aae0c171b09065f997a010583d90cef439e836811bd546a5a412043d67059d9c5dec635bfb6d1e6af7b748f076481600b21b253342a6a985248
-
SSDEEP
196608:R4ySSA0Y+7qPljTEp6vrO3KKJdEh0G1GPB1xbVr6H:KySSA0P7qPlC6Ph3I51nW
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\newapp = "C:\\Users\\Admin\\AppData\\Roaming\\newapp\\newapp.exe" AddInProcess32.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2068 set thread context of 2780 2068 regsvr32.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Kills process with taskkill 1 IoCs
pid Process 580 taskkill.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1296 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2068 regsvr32.exe 2780 AddInProcess32.exe 2780 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2068 regsvr32.exe Token: SeDebugPrivilege 2780 AddInProcess32.exe Token: SeDebugPrivilege 580 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2780 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2744 2068 regsvr32.exe 30 PID 2068 wrote to memory of 2744 2068 regsvr32.exe 30 PID 2068 wrote to memory of 2744 2068 regsvr32.exe 30 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2068 wrote to memory of 2780 2068 regsvr32.exe 31 PID 2016 wrote to memory of 1296 2016 cmd.exe 36 PID 2016 wrote to memory of 1296 2016 cmd.exe 36 PID 2016 wrote to memory of 1296 2016 cmd.exe 36 PID 2016 wrote to memory of 1296 2016 cmd.exe 36 PID 2016 wrote to memory of 1296 2016 cmd.exe 36
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\MACHINE QUOTATION\tedutil.dll"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\windows\system32\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\windows\temp\1014138360.inf2⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Windows\system32\cmd.execmd.exe /C start /D C:\Windows\system32 regsvr32.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\regsvr32.exeregsvr32.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1296
-
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588B
MD5bb9811ebc094caf05f17d224e1d4bcef
SHA188a70fdbcd897578fbb603c7effedeb8f682f927
SHA256cb13e6484911a383bc11bc3740630ab41e54e52ffb3a7b6c716a80fce23c7b5c
SHA5127a049f5e30fdac69753dff8531b830cb22d5e5b91c5a039981f4fdb2df91ea4baf6628ad0cb3a29539096a31210b5e955dc81f0085c6ec75f143308da5ff01dc