Analysis
-
max time kernel
139s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
16-03-2021 13:10
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Purchase order.doc
Resource
win10v20201028
General
-
Target
Purchase order.doc
-
Size
69KB
-
MD5
f0bbb85804a6759fe665b2482b6d083e
-
SHA1
0eba1c2a8877c96b1cda52a11ab2066124663e19
-
SHA256
d60076d9ebcd69f0403422ebb01bf2df5faa59ce3fe2596b76ba0868ec666549
-
SHA512
cc0f3314ba4d01de4af012eac61033d686183b83b2ec6a674ff27248f72dbbe86f8f655460ec37385d6c3f6628f80928dcfaa0cbb135fa541b270b92b5591abf
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
ruben000
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3928-25-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3928-26-0x000000000043760E-mapping.dmp family_agenttesla -
Executes dropped EXE 3 IoCs
Processes:
Server.gifServer.gifServer.gifpid process 2100 Server.gif 3976 Server.gif 3928 Server.gif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Server.gifdescription pid process target process PID 2100 set thread context of 3928 2100 Server.gif Server.gif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 832 WINWORD.EXE 832 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Server.gifServer.gifpid process 2100 Server.gif 2100 Server.gif 3928 Server.gif 3928 Server.gif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Server.gifServer.gifdescription pid process Token: SeDebugPrivilege 2100 Server.gif Token: SeDebugPrivilege 3928 Server.gif -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 832 WINWORD.EXE 832 WINWORD.EXE 832 WINWORD.EXE 832 WINWORD.EXE 832 WINWORD.EXE 832 WINWORD.EXE 832 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
WINWORD.EXEServer.gifdescription pid process target process PID 832 wrote to memory of 2100 832 WINWORD.EXE Server.gif PID 832 wrote to memory of 2100 832 WINWORD.EXE Server.gif PID 832 wrote to memory of 2100 832 WINWORD.EXE Server.gif PID 2100 wrote to memory of 4076 2100 Server.gif schtasks.exe PID 2100 wrote to memory of 4076 2100 Server.gif schtasks.exe PID 2100 wrote to memory of 4076 2100 Server.gif schtasks.exe PID 2100 wrote to memory of 3976 2100 Server.gif Server.gif PID 2100 wrote to memory of 3976 2100 Server.gif Server.gif PID 2100 wrote to memory of 3976 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif PID 2100 wrote to memory of 3928 2100 Server.gif Server.gif
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Purchase order.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Server.gifC:\Users\Admin\AppData\Local\Temp\Server.gif2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OokNvg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6628.tmp"3⤵
- Creates scheduled task(s)
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\Server.gif"C:\Users\Admin\AppData\Local\Temp\Server.gif"3⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Server.gif"C:\Users\Admin\AppData\Local\Temp\Server.gif"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
90acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
MD5
4bb60ef7036ee00d8272c78f40da201e
SHA150547a4c1e40e36367df85cbe09a6b02474ef82e
SHA256d1692c8db90c7a95a72e827ce43ffeb3bc88d3328203c7fd924a9401c8b220e7
SHA5127feadb9ac6dcca3c7fd3db6558efea691d790fc0c57072e9bae388b54235c2f615143b60308e551ba9640bb8648df40744d579ccb4b5847d066a3f0c28f9e17c
-
MD5
4bb60ef7036ee00d8272c78f40da201e
SHA150547a4c1e40e36367df85cbe09a6b02474ef82e
SHA256d1692c8db90c7a95a72e827ce43ffeb3bc88d3328203c7fd924a9401c8b220e7
SHA5127feadb9ac6dcca3c7fd3db6558efea691d790fc0c57072e9bae388b54235c2f615143b60308e551ba9640bb8648df40744d579ccb4b5847d066a3f0c28f9e17c
-
MD5
4bb60ef7036ee00d8272c78f40da201e
SHA150547a4c1e40e36367df85cbe09a6b02474ef82e
SHA256d1692c8db90c7a95a72e827ce43ffeb3bc88d3328203c7fd924a9401c8b220e7
SHA5127feadb9ac6dcca3c7fd3db6558efea691d790fc0c57072e9bae388b54235c2f615143b60308e551ba9640bb8648df40744d579ccb4b5847d066a3f0c28f9e17c
-
MD5
4bb60ef7036ee00d8272c78f40da201e
SHA150547a4c1e40e36367df85cbe09a6b02474ef82e
SHA256d1692c8db90c7a95a72e827ce43ffeb3bc88d3328203c7fd924a9401c8b220e7
SHA5127feadb9ac6dcca3c7fd3db6558efea691d790fc0c57072e9bae388b54235c2f615143b60308e551ba9640bb8648df40744d579ccb4b5847d066a3f0c28f9e17c
-
MD5
18fa17792bd17490763708d16454dcf4
SHA127df889593e101927c104dbcfa1059033cae2feb
SHA256a015a2ed5a06ad374a162fd9da8c6c932aa1b92fa254cd5aa9fc2fecdc069262
SHA512143680d346db4f601f51c9d115c7accf531d89d77fd83dd7b56cd90e28a143b547a288c948cbb171e4d7e4b6e5ed75ee85587ff872df598fda98a43cebd7a79c