Analysis
-
max time kernel
146s -
max time network
69s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
Order confirmation.exe
Resource
win7
Behavioral task
behavioral2
Sample
Order confirmation.exe
Resource
win10v200430
General
-
Target
Order confirmation.exe
-
Size
691KB
-
MD5
26f443f71c6ad850b704d85210309ecb
-
SHA1
a90d70316a39305cbd5ccefbe24e012334e3e086
-
SHA256
83d8b3913153282a251fc2f7bf74f701e02969441341297823957e5d35a5c3b0
-
SHA512
f942bdaf859d0cfbae49b56354146c39d9f2b52bd5ee4b189ed3a49bd62695692a6385f6b488a6bfb5ee3fd58544219f1c8442acbc0190a3662a010e54c1ec60
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mymp4 = "C:\\Users\\Admin\\AppData\\Roaming\\Mymp4\\Mymp4.exe" Order confirmation.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 112 Order confirmation.exe 744 Order confirmation.exe 744 Order confirmation.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 112 set thread context of 744 112 Order confirmation.exe 25 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 744 Order confirmation.exe -
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
resource yara_rule behavioral1/memory/744-2-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral1/memory/744-4-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral1/memory/744-5-0x0000000000400000-0x00000000004B0000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 112 wrote to memory of 780 112 Order confirmation.exe 24 PID 112 wrote to memory of 780 112 Order confirmation.exe 24 PID 112 wrote to memory of 780 112 Order confirmation.exe 24 PID 112 wrote to memory of 780 112 Order confirmation.exe 24 PID 112 wrote to memory of 780 112 Order confirmation.exe 24 PID 112 wrote to memory of 780 112 Order confirmation.exe 24 PID 112 wrote to memory of 744 112 Order confirmation.exe 25 PID 112 wrote to memory of 744 112 Order confirmation.exe 25 PID 112 wrote to memory of 744 112 Order confirmation.exe 25 PID 112 wrote to memory of 744 112 Order confirmation.exe 25 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 112 Order confirmation.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bili.vbs notepad.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:112 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"2⤵
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-