Analysis
-
max time kernel
148s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 10:03
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Order.exe
Resource
win10v20210410
General
-
Target
Order.exe
-
Size
698KB
-
MD5
59aec19eabb5c948f48f949405bf4c66
-
SHA1
86b55319d7d08bfaedeaec425a809d03b2f40079
-
SHA256
ebf9b72c2f7cf094032172e2f318cd41f385e4bb46cb123b3e3138561f8b20a3
-
SHA512
74ff7b142d6c27cd534e03364323184ad1097d398fe0f237a945d534db0b7b3dc53db9cf3b97e47d675c0c8430ba0bb66ed10866afdd80e9d51cfd1c34c71856
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
smithcargo22@vivaldi.net - Password:
invoice12345
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2500-141-0x000000000043764E-mapping.dmp family_agenttesla behavioral2/memory/2500-139-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
Order.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Order.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Order.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\kprUEGC = "C:\\Users\\Admin\\AppData\\Roaming\\kprUEGC\\kprUEGC.exe" Order.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order.exedescription pid process target process PID 3912 set thread context of 2500 3912 Order.exe Order.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exeOrder.exeOrder.exepowershell.exepid process 2132 powershell.exe 1320 powershell.exe 3912 Order.exe 2500 Order.exe 2500 Order.exe 760 powershell.exe 2132 powershell.exe 1320 powershell.exe 760 powershell.exe 2132 powershell.exe 1320 powershell.exe 760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exeOrder.exeOrder.exepowershell.exedescription pid process Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 1320 powershell.exe Token: SeDebugPrivilege 3912 Order.exe Token: SeDebugPrivilege 2500 Order.exe Token: SeDebugPrivilege 760 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Order.exedescription pid process target process PID 3912 wrote to memory of 2132 3912 Order.exe powershell.exe PID 3912 wrote to memory of 2132 3912 Order.exe powershell.exe PID 3912 wrote to memory of 2132 3912 Order.exe powershell.exe PID 3912 wrote to memory of 1320 3912 Order.exe powershell.exe PID 3912 wrote to memory of 1320 3912 Order.exe powershell.exe PID 3912 wrote to memory of 1320 3912 Order.exe powershell.exe PID 3912 wrote to memory of 1808 3912 Order.exe schtasks.exe PID 3912 wrote to memory of 1808 3912 Order.exe schtasks.exe PID 3912 wrote to memory of 1808 3912 Order.exe schtasks.exe PID 3912 wrote to memory of 760 3912 Order.exe powershell.exe PID 3912 wrote to memory of 760 3912 Order.exe powershell.exe PID 3912 wrote to memory of 760 3912 Order.exe powershell.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe PID 3912 wrote to memory of 2500 3912 Order.exe Order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gxdpXGvbVz.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gxdpXGvbVz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC0EF.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gxdpXGvbVz.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
4cd086d4a1a696e22aecac9e7e0fc171
SHA1da7d8b6043f7dc3228d8f7392578e089ad4cf5a9
SHA256f0cf0cfabe28d0b44985bb3936e3d6a88f08118b53b59789ea6194823d6c8787
SHA5122c1c401797a7d5cfd3c7a4e57418aa29043afafa16ca6b588d399961bd13339b7e8d55c37a822c1799d3a7bbd6b228c00faf10fad55b205c0efc97c431c9a1f2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a37a78fc01ef26823c7ce1b2a6e1d51e
SHA14257cfccfa0f930d8d5bc64643eea9717474a09c
SHA256aa175182f3b85cd0d96144dbc2181c815db9b89c21715b79ea1e018f75ea27a3
SHA512456d8a3f661fe9ed30df7d70e1a11058aa708399f3e407229cc3f6bd24f16698a6d90831a6b53ad3a6342dce8fddfa00bcc4622b030d749d4d2e7cde93abffa8
-
C:\Users\Admin\AppData\Local\Temp\tmpC0EF.tmpMD5
fd8d1d66b649cbb587dc77fd5ebc8206
SHA15627d3dc6649c4dc0c4961b586ccf49ae78f8aeb
SHA256173007fb1c8aebb53b6adb23c50566023897d24972d6b29a42eed6b972a1a783
SHA5126011fd333178feebe653f308d8cfa8bd7f3b6552ed241ebc3b74839428e750878b5f421767edfe007b1549464bb706e6b724d1268007dd00e354732dcbd93c7b
-
memory/760-165-0x00000000071A2000-0x00000000071A3000-memory.dmpFilesize
4KB
-
memory/760-137-0x0000000000000000-mapping.dmp
-
memory/760-197-0x00000000071A3000-0x00000000071A4000-memory.dmpFilesize
4KB
-
memory/760-196-0x000000007F190000-0x000000007F191000-memory.dmpFilesize
4KB
-
memory/760-163-0x00000000071A0000-0x00000000071A1000-memory.dmpFilesize
4KB
-
memory/1320-195-0x0000000004D13000-0x0000000004D14000-memory.dmpFilesize
4KB
-
memory/1320-124-0x0000000000000000-mapping.dmp
-
memory/1320-189-0x0000000009820000-0x0000000009853000-memory.dmpFilesize
204KB
-
memory/1320-161-0x0000000004D12000-0x0000000004D13000-memory.dmpFilesize
4KB
-
memory/1320-160-0x0000000004D10000-0x0000000004D11000-memory.dmpFilesize
4KB
-
memory/1320-192-0x000000007DFC0000-0x000000007DFC1000-memory.dmpFilesize
4KB
-
memory/1808-125-0x0000000000000000-mapping.dmp
-
memory/2132-142-0x0000000007A60000-0x0000000007A61000-memory.dmpFilesize
4KB
-
memory/2132-167-0x00000000085E0000-0x00000000085E1000-memory.dmpFilesize
4KB
-
memory/2132-194-0x0000000006DF3000-0x0000000006DF4000-memory.dmpFilesize
4KB
-
memory/2132-193-0x000000007E7C0000-0x000000007E7C1000-memory.dmpFilesize
4KB
-
memory/2132-123-0x0000000000000000-mapping.dmp
-
memory/2132-144-0x0000000007CB0000-0x0000000007CB1000-memory.dmpFilesize
4KB
-
memory/2132-147-0x0000000007DF0000-0x0000000007DF1000-memory.dmpFilesize
4KB
-
memory/2132-131-0x0000000006DF0000-0x0000000006DF1000-memory.dmpFilesize
4KB
-
memory/2132-132-0x0000000006DF2000-0x0000000006DF3000-memory.dmpFilesize
4KB
-
memory/2132-169-0x00000000083E0000-0x00000000083E1000-memory.dmpFilesize
4KB
-
memory/2132-129-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/2132-164-0x0000000007AF0000-0x0000000007AF1000-memory.dmpFilesize
4KB
-
memory/2132-128-0x00000000048B0000-0x00000000048B1000-memory.dmpFilesize
4KB
-
memory/2132-138-0x0000000007330000-0x0000000007331000-memory.dmpFilesize
4KB
-
memory/2500-162-0x0000000004FC0000-0x00000000054BE000-memory.dmpFilesize
5.0MB
-
memory/2500-139-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2500-141-0x000000000043764E-mapping.dmp
-
memory/3912-114-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/3912-122-0x0000000007D80000-0x0000000007DF0000-memory.dmpFilesize
448KB
-
memory/3912-121-0x0000000005300000-0x00000000053A4000-memory.dmpFilesize
656KB
-
memory/3912-120-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/3912-119-0x0000000004AB0000-0x0000000004ABE000-memory.dmpFilesize
56KB
-
memory/3912-118-0x0000000004CB0000-0x0000000004CB1000-memory.dmpFilesize
4KB
-
memory/3912-117-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/3912-116-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB