Analysis
-
max time kernel
135s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:44
Static task
static1
Behavioral task
behavioral1
Sample
Spare parts demand order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Spare parts demand order.exe
Resource
win10v2004-20220414-en
General
-
Target
Spare parts demand order.exe
-
Size
725KB
-
MD5
2fbc5c23cc080717a4bbce55ff6f3f26
-
SHA1
18c214848e1bdde00cb5233eae45f9ff9f469698
-
SHA256
76c6dd89d385638ed14036393f9e31c6a92417952f95655e66beacf003c88891
-
SHA512
de29b3d7fcb0a4d43d0c60723391d17ee68283f6f4137dd0d774d6855f3ea2fbcab70fb727630f93287f2e150d19a2d1a92e1f62469bd64cc72823df11e16951
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.prcpl.com - Port:
587 - Username:
[email protected] - Password:
jyotika@2015
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4304-138-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Spare parts demand order.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Spare parts demand order.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jIxVtUg = "C:\\Users\\Admin\\AppData\\Roaming\\jIxVtUg\\jIxVtUg.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Spare parts demand order.exedescription pid process target process PID 4344 set thread context of 4304 4344 Spare parts demand order.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Spare parts demand order.exeRegSvcs.exepid process 4344 Spare parts demand order.exe 4344 Spare parts demand order.exe 4344 Spare parts demand order.exe 4344 Spare parts demand order.exe 4304 RegSvcs.exe 4304 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Spare parts demand order.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4344 Spare parts demand order.exe Token: SeDebugPrivilege 4304 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Spare parts demand order.exeRegSvcs.exedescription pid process target process PID 4344 wrote to memory of 808 4344 Spare parts demand order.exe schtasks.exe PID 4344 wrote to memory of 808 4344 Spare parts demand order.exe schtasks.exe PID 4344 wrote to memory of 808 4344 Spare parts demand order.exe schtasks.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4344 wrote to memory of 4304 4344 Spare parts demand order.exe RegSvcs.exe PID 4304 wrote to memory of 4080 4304 RegSvcs.exe REG.exe PID 4304 wrote to memory of 4080 4304 RegSvcs.exe REG.exe PID 4304 wrote to memory of 4080 4304 RegSvcs.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spare parts demand order.exe"C:\Users\Admin\AppData\Local\Temp\Spare parts demand order.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YggCmNxSl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp444C.tmp"2⤵
- Creates scheduled task(s)
PID:808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4304 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:4080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cffa49d56a15e2b7e56f7b62599fb738
SHA184cb517369e308c5c93045ef276a24ebfe663adf
SHA256a5a622bfcfe87afa1c21131d34f29484b9cbdd381e74f83f8403d85be55651b3
SHA5124b06aa7f4da4615fc83fd25e1f6f3609b8dd15a9aac64e81c0f98db65856b1e0a5862da1a9cefc2536ca0c27362db11d3100c83525a9af2ebd0feed53fa0f564