Analysis Overview
SHA256
a4d3085a47bf0da4fa557e18de19bada74667d0eaa3dca959990b96215bb25cc
Threat Level: Known bad
The file new purchase order.rar.exe was found to be: Known bad.
Malicious Activity Summary
CoreEntity .NET Packer
AgentTesla
NanoCore
Snakebot family
Contains SnakeBOT related strings
rezer0
AgentTesla Payload
Drops file in Drivers directory
Disables Task Manager via registry modification
Suspicious use of SetThreadContext
Program crash
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Modifies registry key
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2020-11-09 19:37
Signatures
Snakebot family
Contains SnakeBOT related strings
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2020-11-09 19:37
Reported
2020-11-09 22:05
Platform
win7v20201028
Max time kernel
97s
Max time network
96s
Command Line
Signatures
AgentTesla
CoreEntity .NET Packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
AgentTesla Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
rezer0
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Disables Task Manager via registry modification
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\drivers\etc\hosts | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 536 set thread context of 1740 | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\REG.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe
"C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"{path}"
C:\Windows\SysWOW64\REG.exe
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
C:\Windows\SysWOW64\netsh.exe
"netsh" wlan show profile
Network
Files
memory/536-0-0x0000000074360000-0x0000000074A4E000-memory.dmp
memory/536-1-0x0000000000380000-0x0000000000381000-memory.dmp
memory/1988-3-0x000007FEF6010000-0x000007FEF628A000-memory.dmp
memory/536-4-0x0000000000310000-0x0000000000313000-memory.dmp
memory/536-5-0x00000000044D0000-0x0000000004523000-memory.dmp
memory/1740-6-0x0000000000400000-0x0000000000452000-memory.dmp
memory/1740-7-0x000000000044C6EE-mapping.dmp
memory/1740-8-0x0000000000400000-0x0000000000452000-memory.dmp
memory/1740-9-0x0000000000400000-0x0000000000452000-memory.dmp
memory/1740-10-0x00000000742E0000-0x00000000749CE000-memory.dmp
memory/1432-13-0x0000000000000000-mapping.dmp
memory/744-14-0x0000000000000000-mapping.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2020-11-09 19:37
Reported
2020-11-09 22:05
Platform
win10v20201028
Max time kernel
67s
Max time network
132s
Command Line
Signatures
AgentTesla
CoreEntity .NET Packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
NanoCore
AgentTesla Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
rezer0
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Disables Task Manager via registry modification
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\drivers\etc\hosts | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3932 set thread context of 3976 | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\REG.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WerFault.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe
"C:\Users\Admin\AppData\Local\Temp\new purchase order.rar.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"{path}"
C:\Windows\SysWOW64\REG.exe
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 1432
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | www.google.com.br | udp |
| N/A | 172.217.19.195:443 | www.google.com.br | tcp |
| N/A | 13.107.4.52:80 | www.msftconnecttest.com | tcp |
Files
memory/3932-0-0x0000000073300000-0x00000000739EE000-memory.dmp
memory/3932-1-0x0000000000C00000-0x0000000000C01000-memory.dmp
memory/3932-3-0x0000000007E40000-0x0000000007E41000-memory.dmp
memory/3932-4-0x00000000079E0000-0x00000000079E1000-memory.dmp
memory/3932-5-0x00000000079A0000-0x00000000079A1000-memory.dmp
memory/3932-6-0x0000000002E20000-0x0000000002E23000-memory.dmp
memory/3932-7-0x000000000B470000-0x000000000B4C3000-memory.dmp
memory/3932-8-0x000000000B570000-0x000000000B571000-memory.dmp
memory/3976-9-0x0000000000400000-0x0000000000452000-memory.dmp
memory/3976-10-0x000000000044C6EE-mapping.dmp
memory/3976-11-0x0000000073300000-0x00000000739EE000-memory.dmp
memory/3976-16-0x00000000053E0000-0x00000000053E1000-memory.dmp
memory/3976-17-0x0000000005EB0000-0x0000000005EB1000-memory.dmp
memory/3128-18-0x0000000000000000-mapping.dmp
memory/2064-19-0x00000000044A0000-0x00000000044A1000-memory.dmp
memory/3976-20-0x000000000044C6EE-mapping.dmp
memory/3976-22-0x000000000044C6EE-mapping.dmp
memory/3976-21-0x000000000044C6EE-mapping.dmp
memory/3976-23-0x000000000044C6EE-mapping.dmp
memory/3976-25-0x000000000044C6EE-mapping.dmp
memory/3976-24-0x000000000044C6EE-mapping.dmp
memory/3976-26-0x000000000044C6EE-mapping.dmp
memory/3976-27-0x000000000044C6EE-mapping.dmp
memory/3976-28-0x000000000044C6EE-mapping.dmp
memory/3976-30-0x000000000044C6EE-mapping.dmp
memory/3976-29-0x000000000044C6EE-mapping.dmp
memory/2064-31-0x0000000004AD0000-0x0000000004AD1000-memory.dmp