Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08/07/2020, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
Order confirmation.exe
Resource
win7
Behavioral task
behavioral2
Sample
Order confirmation.exe
Resource
win10v200430
General
-
Target
Order confirmation.exe
-
Size
691KB
-
MD5
26f443f71c6ad850b704d85210309ecb
-
SHA1
a90d70316a39305cbd5ccefbe24e012334e3e086
-
SHA256
83d8b3913153282a251fc2f7bf74f701e02969441341297823957e5d35a5c3b0
-
SHA512
f942bdaf859d0cfbae49b56354146c39d9f2b52bd5ee4b189ed3a49bd62695692a6385f6b488a6bfb5ee3fd58544219f1c8442acbc0190a3662a010e54c1ec60
Malware Config
Extracted
Protocol: smtp- Host:
smtp.bnb-spa.com - Port:
587 - Username:
[email protected] - Password:
tPo!47:glt$E
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3228 Order confirmation.exe -
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bili.vbs notepad.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
resource yara_rule behavioral2/memory/3228-1-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral2/memory/3228-3-0x0000000000400000-0x00000000004B0000-memory.dmp upx behavioral2/memory/3228-4-0x0000000000400000-0x00000000004B0000-memory.dmp upx -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mymp4 = "C:\\Users\\Admin\\AppData\\Roaming\\Mymp4\\Mymp4.exe" Order confirmation.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 Order confirmation.exe 1628 Order confirmation.exe 3228 Order confirmation.exe 3228 Order confirmation.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2760 1628 Order confirmation.exe 72 PID 1628 wrote to memory of 2760 1628 Order confirmation.exe 72 PID 1628 wrote to memory of 2760 1628 Order confirmation.exe 72 PID 1628 wrote to memory of 2760 1628 Order confirmation.exe 72 PID 1628 wrote to memory of 2760 1628 Order confirmation.exe 72 PID 1628 wrote to memory of 3228 1628 Order confirmation.exe 73 PID 1628 wrote to memory of 3228 1628 Order confirmation.exe 73 PID 1628 wrote to memory of 3228 1628 Order confirmation.exe 73 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1628 Order confirmation.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 3228 1628 Order confirmation.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1628 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"C:\Users\Admin\AppData\Local\Temp\Order confirmation.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Suspicious behavior: EnumeratesProcesses
PID:3228
-