Analysis

  • max time kernel
    156s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    08-02-2022 01:08

General

  • Target

    Orders.exe

  • Size

    1.6MB

  • MD5

    e85daf3a43f107b213310a53bfd35aa9

  • SHA1

    042208c7a232b806c6382e34417f9c8e2a955747

  • SHA256

    0b1fbc81d9d9e685307e80d20afe4b01c6538b903b77136b0d1db2486fe8c6e8

  • SHA512

    29688e0fe124802b3317355e9836864147e56f6e1d47f702f88ea36df813f0eb388818ead042c4463619e17bd5ec295d4cfc4f0caa2c2dbd90edd22b2277ec7d

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MARYolanmauluogwo@ever

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Matiex

    Matiex is a keylogger and infostealer first seen in July 2020.

  • Matiex Main Payload 6 IoCs
  • AgentTesla Payload 11 IoCs
  • Beds Protector Packer 2 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • NirSoft MailPassView 7 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Orders.exe
    "C:\Users\Admin\AppData\Local\Temp\Orders.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\Orders.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:768
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe
        "C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe" 0
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          4⤵
          • Accesses Microsoft Outlook accounts
          PID:2012
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          4⤵
            PID:1116
        • C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe
          "C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe" 0
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Windows\SysWOW64\netsh.exe
            "netsh" wlan show profile
            4⤵
              PID:676
          • C:\Users\Admin\AppData\Local\Temp\origigoods40.exe
            "C:\Users\Admin\AppData\Local\Temp\origigoods40.exe" 0
            3⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:1180
          • C:\Users\Admin\AppData\Local\Temp\origigoods20.exe
            "C:\Users\Admin\AppData\Local\Temp\origigoods20.exe" 0
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1332
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 520
              4⤵
              • Loads dropped DLL
              PID:1768
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 640
          2⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1704

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe

        MD5

        80c61b903400b534858d047dd0919f0e

        SHA1

        d0ab5400b74392308140642c75f0897e16a88d60

        SHA256

        25ade9899c000a27570b527cffc938ec9626978219ec8a086082b113cbe4f492

        SHA512

        b3216f0e4e95c7f50bccba5fdcca2ad622a42379383be855546fa1e0bac41a6beea8226f8634ad5e0d8596169e0443494018bbe70b7052f094402aecaa038bce

      • C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe

        MD5

        80c61b903400b534858d047dd0919f0e

        SHA1

        d0ab5400b74392308140642c75f0897e16a88d60

        SHA256

        25ade9899c000a27570b527cffc938ec9626978219ec8a086082b113cbe4f492

        SHA512

        b3216f0e4e95c7f50bccba5fdcca2ad622a42379383be855546fa1e0bac41a6beea8226f8634ad5e0d8596169e0443494018bbe70b7052f094402aecaa038bce

      • C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe

        MD5

        ffdb58533d5d1362e896e96fb6f02a95

        SHA1

        d6e4a3ca253bfc372a9a3180b5887c716ed285c6

        SHA256

        b3d02fd5c69293db419ac03cdf6396bd5e7765682fb3b2390454d9a52ba2ca88

        SHA512

        3ae6e49d3d728531201453a0bc27436b1a4305c8ef938b2cbb5e34ee45bb9a9a88cf2a41b08e4914fda9a96bbaa48bd999a2d2f1dffcd39761bb1f3620ca725f

      • C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe

        MD5

        ffdb58533d5d1362e896e96fb6f02a95

        SHA1

        d6e4a3ca253bfc372a9a3180b5887c716ed285c6

        SHA256

        b3d02fd5c69293db419ac03cdf6396bd5e7765682fb3b2390454d9a52ba2ca88

        SHA512

        3ae6e49d3d728531201453a0bc27436b1a4305c8ef938b2cbb5e34ee45bb9a9a88cf2a41b08e4914fda9a96bbaa48bd999a2d2f1dffcd39761bb1f3620ca725f

      • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\origigoods20.exe

        MD5

        61dc57c6575e1f3f2ae14c1b332ad2fb

        SHA1

        f52f34623048e5fd720e97a72eedfd32358cd3a9

        SHA256

        1c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab

        SHA512

        81a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1

      • C:\Users\Admin\AppData\Local\Temp\origigoods20.exe

        MD5

        61dc57c6575e1f3f2ae14c1b332ad2fb

        SHA1

        f52f34623048e5fd720e97a72eedfd32358cd3a9

        SHA256

        1c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab

        SHA512

        81a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1

      • C:\Users\Admin\AppData\Local\Temp\origigoods40.exe

        MD5

        ae36f0d16230b9f41ffecbd3c5b1d660

        SHA1

        88afc2923d1eefb70bad3c0cd9304949954377ef

        SHA256

        cfad1e486666ff3fb042ba0e9967634de1065f1bbd505c61b3295e55705a2a50

        SHA512

        1e98aee7dc693822113dcde1446a5bed1c564b76eef39f39f3a5d98d7d2099cf69ac92717a3297afc7082203929f1e9437f21cb6bc690974a0ef6d6cf6e4393c

      • C:\Users\Admin\AppData\Local\Temp\origigoods40.exe

        MD5

        ae36f0d16230b9f41ffecbd3c5b1d660

        SHA1

        88afc2923d1eefb70bad3c0cd9304949954377ef

        SHA256

        cfad1e486666ff3fb042ba0e9967634de1065f1bbd505c61b3295e55705a2a50

        SHA512

        1e98aee7dc693822113dcde1446a5bed1c564b76eef39f39f3a5d98d7d2099cf69ac92717a3297afc7082203929f1e9437f21cb6bc690974a0ef6d6cf6e4393c

      • \Users\Admin\AppData\Local\Temp\Matiexgoods.exe

        MD5

        80c61b903400b534858d047dd0919f0e

        SHA1

        d0ab5400b74392308140642c75f0897e16a88d60

        SHA256

        25ade9899c000a27570b527cffc938ec9626978219ec8a086082b113cbe4f492

        SHA512

        b3216f0e4e95c7f50bccba5fdcca2ad622a42379383be855546fa1e0bac41a6beea8226f8634ad5e0d8596169e0443494018bbe70b7052f094402aecaa038bce

      • \Users\Admin\AppData\Local\Temp\hawkgoods.exe

        MD5

        ffdb58533d5d1362e896e96fb6f02a95

        SHA1

        d6e4a3ca253bfc372a9a3180b5887c716ed285c6

        SHA256

        b3d02fd5c69293db419ac03cdf6396bd5e7765682fb3b2390454d9a52ba2ca88

        SHA512

        3ae6e49d3d728531201453a0bc27436b1a4305c8ef938b2cbb5e34ee45bb9a9a88cf2a41b08e4914fda9a96bbaa48bd999a2d2f1dffcd39761bb1f3620ca725f

      • \Users\Admin\AppData\Local\Temp\origigoods20.exe

        MD5

        61dc57c6575e1f3f2ae14c1b332ad2fb

        SHA1

        f52f34623048e5fd720e97a72eedfd32358cd3a9

        SHA256

        1c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab

        SHA512

        81a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1

      • \Users\Admin\AppData\Local\Temp\origigoods20.exe

        MD5

        61dc57c6575e1f3f2ae14c1b332ad2fb

        SHA1

        f52f34623048e5fd720e97a72eedfd32358cd3a9

        SHA256

        1c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab

        SHA512

        81a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1

      • \Users\Admin\AppData\Local\Temp\origigoods20.exe

        MD5

        61dc57c6575e1f3f2ae14c1b332ad2fb

        SHA1

        f52f34623048e5fd720e97a72eedfd32358cd3a9

        SHA256

        1c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab

        SHA512

        81a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1

      • \Users\Admin\AppData\Local\Temp\origigoods40.exe

        MD5

        ae36f0d16230b9f41ffecbd3c5b1d660

        SHA1

        88afc2923d1eefb70bad3c0cd9304949954377ef

        SHA256

        cfad1e486666ff3fb042ba0e9967634de1065f1bbd505c61b3295e55705a2a50

        SHA512

        1e98aee7dc693822113dcde1446a5bed1c564b76eef39f39f3a5d98d7d2099cf69ac92717a3297afc7082203929f1e9437f21cb6bc690974a0ef6d6cf6e4393c

      • memory/436-110-0x0000000000985000-0x0000000000996000-memory.dmp

        Filesize

        68KB

      • memory/436-114-0x0000000000996000-0x0000000000997000-memory.dmp

        Filesize

        4KB

      • memory/436-76-0x000000006F2F0000-0x000000006F89B000-memory.dmp

        Filesize

        5.7MB

      • memory/436-77-0x0000000000980000-0x0000000000981000-memory.dmp

        Filesize

        4KB

      • memory/436-78-0x000000006F2F0000-0x000000006F89B000-memory.dmp

        Filesize

        5.7MB

      • memory/768-68-0x000000006F2F0000-0x000000006F89B000-memory.dmp

        Filesize

        5.7MB

      • memory/768-79-0x00000000022E0000-0x0000000002F2A000-memory.dmp

        Filesize

        12.3MB

      • memory/768-75-0x000000006F2F0000-0x000000006F89B000-memory.dmp

        Filesize

        5.7MB

      • memory/768-84-0x00000000022E0000-0x0000000002F2A000-memory.dmp

        Filesize

        12.3MB

      • memory/768-70-0x00000000022E0000-0x0000000002F2A000-memory.dmp

        Filesize

        12.3MB

      • memory/1116-112-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1116-115-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1180-85-0x00000000001F0000-0x000000000022C000-memory.dmp

        Filesize

        240KB

      • memory/1180-99-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

        Filesize

        4KB

      • memory/1180-86-0x0000000074CC0000-0x00000000753AE000-memory.dmp

        Filesize

        6.9MB

      • memory/1180-120-0x0000000004BA1000-0x0000000004BA2000-memory.dmp

        Filesize

        4KB

      • memory/1332-97-0x000000006F2F0000-0x000000006F89B000-memory.dmp

        Filesize

        5.7MB

      • memory/1332-98-0x00000000004A0000-0x00000000004A1000-memory.dmp

        Filesize

        4KB

      • memory/1676-61-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/1676-87-0x0000000000401000-0x0000000000402000-memory.dmp

        Filesize

        4KB

      • memory/1676-69-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/1676-64-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/1676-63-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/1676-62-0x0000000000400000-0x0000000000562000-memory.dmp

        Filesize

        1.4MB

      • memory/1704-101-0x0000000001DB0000-0x0000000001DB1000-memory.dmp

        Filesize

        4KB

      • memory/1756-58-0x0000000004BA0000-0x0000000004BA1000-memory.dmp

        Filesize

        4KB

      • memory/1756-54-0x0000000074CC0000-0x00000000753AE000-memory.dmp

        Filesize

        6.9MB

      • memory/1756-55-0x0000000000AF0000-0x0000000000C84000-memory.dmp

        Filesize

        1.6MB

      • memory/1756-56-0x00000000049C0000-0x0000000004B52000-memory.dmp

        Filesize

        1.6MB

      • memory/1756-57-0x0000000076071000-0x0000000076073000-memory.dmp

        Filesize

        8KB

      • memory/1756-60-0x00000000003E0000-0x00000000003F6000-memory.dmp

        Filesize

        88KB

      • memory/1768-107-0x0000000001F30000-0x0000000001F31000-memory.dmp

        Filesize

        4KB

      • memory/1832-91-0x0000000000370000-0x00000000003E6000-memory.dmp

        Filesize

        472KB

      • memory/1832-90-0x0000000074CC0000-0x00000000753AE000-memory.dmp

        Filesize

        6.9MB

      • memory/1832-119-0x0000000005665000-0x0000000005676000-memory.dmp

        Filesize

        68KB

      • memory/1832-103-0x0000000005660000-0x0000000005661000-memory.dmp

        Filesize

        4KB

      • memory/2012-111-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2012-108-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB