Analysis
-
max time kernel
139s -
max time network
32s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10-07-2020 07:03
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Order.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
Order.exe
-
Size
604KB
-
MD5
856bb59a00ebbb5fe4a3e73484631f17
-
SHA1
381ae99021cd1c7f84035b1d821f4bbca81487fd
-
SHA256
684eb557696d45ec516edbae21d19c390e4261aefab4dd87c1b01d2f12a36715
-
SHA512
6ea13fb9084009bb4e2aee4f58d3525d89053b0ba92e9744e67af8fa4cdde70207f56abc77a760c2287bab5dde5e575bacf177807f254bf473f8ecdad4096208
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.israelagroconsultant.com - Port:
587 - Username:
[email protected] - Password:
israelagro@123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1832-4-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1832-5-0x00000000004473EE-mapping.dmp family_agenttesla behavioral1/memory/1832-6-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1832-7-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\TkvuX = "C:\\Users\\Admin\\AppData\\Roaming\\TkvuX\\TkvuX.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 1832 1400 Order.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1796 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1584 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 RegSvcs.exe 1832 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1400 Order.exe Token: SeDebugPrivilege 1832 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1796 1400 Order.exe 26 PID 1400 wrote to memory of 1796 1400 Order.exe 26 PID 1400 wrote to memory of 1796 1400 Order.exe 26 PID 1400 wrote to memory of 1796 1400 Order.exe 26 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1400 wrote to memory of 1832 1400 Order.exe 28 PID 1832 wrote to memory of 1584 1832 RegSvcs.exe 30 PID 1832 wrote to memory of 1584 1832 RegSvcs.exe 30 PID 1832 wrote to memory of 1584 1832 RegSvcs.exe 30 PID 1832 wrote to memory of 1584 1832 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jPLciLBhy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp733B.tmp"2⤵
- Creates scheduled task(s)
PID:1796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1584
-
-