Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 01:16
Static task
static1
Behavioral task
behavioral1
Sample
MACHINE QUOTATION/MACHINE QUOTATION.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
MACHINE QUOTATION/tedutil.dll
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
MACHINE QUOTATION/tedutil.dll
Resource
win10v2004-20241007-en
General
-
Target
MACHINE QUOTATION/tedutil.dll
-
Size
14.1MB
-
MD5
f5d36baa964bd1f219483fbd39013d97
-
SHA1
09d2ba088ce0982a09f59615cd4622ff83055a8d
-
SHA256
290a36d8428ef6694919b9aeb575003cb1ed58a80b716bb270a578b37ff15926
-
SHA512
993696e0f0f41aae0c171b09065f997a010583d90cef439e836811bd546a5a412043d67059d9c5dec635bfb6d1e6af7b748f076481600b21b253342a6a985248
-
SSDEEP
196608:R4ySSA0Y+7qPljTEp6vrO3KKJdEh0G1GPB1xbVr6H:KySSA0P7qPlC6Ph3I51nW
Malware Config
Extracted
Protocol: ftp- Host:
ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.ercolina-usa.com - Port:
21 - Username:
[email protected] - Password:
nXe0M~WkW&nJ
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\newapp = "C:\\Users\\Admin\\AppData\\Roaming\\newapp\\newapp.exe" AddInProcess32.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org 13 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4928 set thread context of 4164 4928 regsvr32.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Kills process with taskkill 1 IoCs
pid Process 1748 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4928 regsvr32.exe 4164 AddInProcess32.exe 4164 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4928 regsvr32.exe Token: SeDebugPrivilege 4164 AddInProcess32.exe Token: SeDebugPrivilege 1748 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4164 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4928 wrote to memory of 424 4928 regsvr32.exe 82 PID 4928 wrote to memory of 424 4928 regsvr32.exe 82 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 4928 wrote to memory of 4164 4928 regsvr32.exe 83 PID 1876 wrote to memory of 3660 1876 cmd.exe 88 PID 1876 wrote to memory of 3660 1876 cmd.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\MACHINE QUOTATION\tedutil.dll"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\windows\system32\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\windows\temp\1173636944.inf2⤵PID:424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4164
-
-
C:\Windows\system32\cmd.execmd.exe /C start /D C:\Windows\system32 regsvr32.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\regsvr32.exeregsvr32.exe2⤵PID:3660
-
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588B
MD5bb9811ebc094caf05f17d224e1d4bcef
SHA188a70fdbcd897578fbb603c7effedeb8f682f927
SHA256cb13e6484911a383bc11bc3740630ab41e54e52ffb3a7b6c716a80fce23c7b5c
SHA5127a049f5e30fdac69753dff8531b830cb22d5e5b91c5a039981f4fdb2df91ea4baf6628ad0cb3a29539096a31210b5e955dc81f0085c6ec75f143308da5ff01dc