Analysis
-
max time kernel
105s -
max time network
73s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 13:32
Static task
static1
Behavioral task
behavioral1
Sample
FIRST PURCHASE ORDER.exe
Resource
win7
Behavioral task
behavioral2
Sample
FIRST PURCHASE ORDER.exe
Resource
win10v200430
General
-
Target
FIRST PURCHASE ORDER.exe
-
Size
714KB
-
MD5
dbbac19cfd01ab4e759500a13168a30b
-
SHA1
71917c8765aaa6e2869cc1b949bfddf3580457c5
-
SHA256
fe41fe0b302887f61f20473015f386ab57ddb4cc278b3e1639c07337012a58f4
-
SHA512
caa08b928acff84a762f64c8c18c332db8f546d003085415560bdc265c3c90953d3e54da5e2031d188beca49e8c891966f8f8de66c8202928045acfd7d80d4ee
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1780-4-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1780-5-0x00000000004472EE-mapping.dmp family_agenttesla behavioral1/memory/1780-6-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1780-7-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\sLbGMVN = "C:\\Users\\Admin\\AppData\\Roaming\\sLbGMVN\\sLbGMVN.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1780 1492 FIRST PURCHASE ORDER.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 324 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1956 REG.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1492 FIRST PURCHASE ORDER.exe 1780 RegSvcs.exe 1780 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 FIRST PURCHASE ORDER.exe Token: SeDebugPrivilege 1780 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1492 wrote to memory of 324 1492 FIRST PURCHASE ORDER.exe 24 PID 1492 wrote to memory of 324 1492 FIRST PURCHASE ORDER.exe 24 PID 1492 wrote to memory of 324 1492 FIRST PURCHASE ORDER.exe 24 PID 1492 wrote to memory of 324 1492 FIRST PURCHASE ORDER.exe 24 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1492 wrote to memory of 1780 1492 FIRST PURCHASE ORDER.exe 26 PID 1780 wrote to memory of 1956 1780 RegSvcs.exe 30 PID 1780 wrote to memory of 1956 1780 RegSvcs.exe 30 PID 1780 wrote to memory of 1956 1780 RegSvcs.exe 30 PID 1780 wrote to memory of 1956 1780 RegSvcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\FIRST PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\FIRST PURCHASE ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EOFicAFbFaB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD2F7.tmp"2⤵
- Creates scheduled task(s)
PID:324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1956
-
-