Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
20-10-2021 01:55
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order PO63829.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Purchase Order PO63829.exe
Resource
win10-en-20210920
General
-
Target
Purchase Order PO63829.exe
-
Size
356KB
-
MD5
b8d994b327b1f42d63e6d9e7294853a0
-
SHA1
5e6f6dfddffa48bdfd9890f68b456482b40d3b8f
-
SHA256
750c482a5ed1cc058c1bdfc18bc84d963f03cf75103ff66ea3452128a67bcd0e
-
SHA512
a6441be339ac71ac91f1416aa7ebf408ddc6b490acb4a82532a16a036d299fd49ccc7aa9b631a61091f28b844ea9bfecf4c2698991d04e01b208a99fc54885f3
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1588-57-0x0000000000400000-0x000000000044B000-memory.dmp family_agenttesla behavioral1/memory/1588-58-0x000000000040188B-mapping.dmp family_agenttesla behavioral1/memory/1588-60-0x0000000000400000-0x000000000044B000-memory.dmp family_agenttesla -
Loads dropped DLL 1 IoCs
Processes:
Purchase Order PO63829.exepid process 1360 Purchase Order PO63829.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Order PO63829.exedescription pid process target process PID 1360 set thread context of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Purchase Order PO63829.exepid process 1588 Purchase Order PO63829.exe 1588 Purchase Order PO63829.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dw20.exepid process 592 dw20.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Purchase Order PO63829.exedescription pid process Token: SeDebugPrivilege 1588 Purchase Order PO63829.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Purchase Order PO63829.exePurchase Order PO63829.exedescription pid process target process PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1360 wrote to memory of 1588 1360 Purchase Order PO63829.exe Purchase Order PO63829.exe PID 1588 wrote to memory of 592 1588 Purchase Order PO63829.exe dw20.exe PID 1588 wrote to memory of 592 1588 Purchase Order PO63829.exe dw20.exe PID 1588 wrote to memory of 592 1588 Purchase Order PO63829.exe dw20.exe PID 1588 wrote to memory of 592 1588 Purchase Order PO63829.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order PO63829.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order PO63829.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order PO63829.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order PO63829.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5083⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7b019f3a9e8d090da6cba443fd94e6cd
SHA1ba78720dbd3a43d22a298f9162fd4b7dfd1749f8
SHA256ccae014473dfa19d867b763bde0529f56b292bf3e225f48c15b2eed6d81983d7
SHA51221f1a7f7a2fc29726f065b7f6cb913126d1164df75974373d74d131e65499a962ba14e0c7d56d2d733bef4f376c51810987cd3353e800fb8d73a8a23510fa884