Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice.exe
Resource
win7
Behavioral task
behavioral2
Sample
Proforma Invoice.exe
Resource
win10v200430
General
-
Target
Proforma Invoice.exe
-
Size
923KB
-
MD5
2b952a9344d926a08dfd69de423528e2
-
SHA1
823670d855617a727ae9d9aa0858e49c558bcf41
-
SHA256
ae451bf0f958bf82ce70a55e5e0af6fbb70f1b06cd0bacb5bdc196c16f6da11b
-
SHA512
e9783f69df250cbee29aba8ef09bdbf0de4a6ca1f181b1505bd772aec43753b828befc46e717f6654a0010de93dbe9623abc3027746e8b383e2cb02712159236
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sales1.vbs notepad.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\DsWhv = "C:\\Users\\Admin\\AppData\\Roaming\\DsWhv\\DsWhv.exe" Proforma Invoice.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1104 1044 Proforma Invoice.exe 24 PID 1044 wrote to memory of 1104 1044 Proforma Invoice.exe 24 PID 1044 wrote to memory of 1104 1044 Proforma Invoice.exe 24 PID 1044 wrote to memory of 1104 1044 Proforma Invoice.exe 24 PID 1044 wrote to memory of 1104 1044 Proforma Invoice.exe 24 PID 1044 wrote to memory of 1104 1044 Proforma Invoice.exe 24 PID 1044 wrote to memory of 1232 1044 Proforma Invoice.exe 25 PID 1044 wrote to memory of 1232 1044 Proforma Invoice.exe 25 PID 1044 wrote to memory of 1232 1044 Proforma Invoice.exe 25 PID 1044 wrote to memory of 1232 1044 Proforma Invoice.exe 25 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1232 Proforma Invoice.exe -
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
resource yara_rule behavioral1/memory/1232-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1232-4-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1232-5-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1044 Proforma Invoice.exe 1232 Proforma Invoice.exe 1232 Proforma Invoice.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1044 Proforma Invoice.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1044 set thread context of 1232 1044 Proforma Invoice.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1044 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"2⤵
- Adds Run entry to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1232
-