Analysis
-
max time kernel
145s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-03-2022 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Docs.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
Shipment Docs.exe
Resource
win10v2004-en-20220113
General
-
Target
Shipment Docs.exe
-
Size
513KB
-
MD5
73e5451011ebf24c6ff6b945adf6f443
-
SHA1
33cd90107c301a1dc51b13142160dda8dc525483
-
SHA256
5057d8b5104c79609ea7234da4d51f6883622ee5e3e1b660489d247b920f6d90
-
SHA512
d7d405511c78565ff71887a93d5f7da6df4b3314249b2f5457678c28f1d5748558eca57d5ee1daaee45f49a9aab6506150781a5304ac5abffd679ed2bc70d463
Malware Config
Extracted
Protocol: smtp- Host:
mail.indiacarpet.in - Port:
587 - Username:
[email protected] - Password:
india@12345
Signatures
-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
Drops file in Drivers directory 1 IoCs
Processes:
Shipment Docs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts Shipment Docs.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Shipment Docs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Docs.exe Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Docs.exe Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Docs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Shipment Docs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kECjS = "C:\\Users\\Admin\\AppData\\Roaming\\kECjS\\kECjS.exe" Shipment Docs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Shipment Docs.exedescription pid process target process PID 1176 set thread context of 4856 1176 Shipment Docs.exe Shipment Docs.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Shipment Docs.exeShipment Docs.exepid process 1176 Shipment Docs.exe 4856 Shipment Docs.exe 4856 Shipment Docs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Shipment Docs.exeShipment Docs.exedescription pid process Token: SeDebugPrivilege 1176 Shipment Docs.exe Token: SeDebugPrivilege 4856 Shipment Docs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Shipment Docs.exedescription pid process target process PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe PID 1176 wrote to memory of 4856 1176 Shipment Docs.exe Shipment Docs.exe -
outlook_office_path 1 IoCs
Processes:
Shipment Docs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Docs.exe -
outlook_win_path 1 IoCs
Processes:
Shipment Docs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipment Docs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipment Docs.exe"C:\Users\Admin\AppData\Local\Temp\Shipment Docs.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Shipment Docs.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4856
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
84e77a587d94307c0ac1357eb4d3d46f
SHA183cc900f9401f43d181207d64c5adba7a85edc1e
SHA256e16024b092a026a9dc00df69d4b9bbcab7b2dc178dc5291fc308a1abc9304a99
SHA512aefb5c62200b3ed97718d20a89990954d4d8acdc0a6a73c5a420f1bba619cb79e70c2cd0a579b9f52dc6b09e1de2cea6cd6cac4376cfee92d94e2c01d310f691