Analysis
-
max time kernel
111s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:57
Static task
static1
Behavioral task
behavioral1
Sample
NEW INVOICE.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW INVOICE.exe
Resource
win10v2004-20220414-en
General
-
Target
NEW INVOICE.exe
-
Size
561KB
-
MD5
55b95046471af229ee99c420a9305466
-
SHA1
5722d102e4010564f2428ed878c58a8a6a865e45
-
SHA256
f63a89559c83329e8ea8f79ad5cbd03d3ae2f5a71312f26feecc132379c14eab
-
SHA512
8eddf9d88a340fc70201fc6c2dd4b9ac9cf4523e0de24404ed2fe7ca98a832d4a30786ce82234829a2ef93d85ac83547829660cb121b0a19a7ca26af6dba9e69
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.proetizo.com - Port:
587 - Username:
[email protected] - Password:
:n7#l_CcH8wh
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4952-138-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
NEW INVOICE.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation NEW INVOICE.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
NEW INVOICE.exedescription pid process target process PID 2644 set thread context of 4952 2644 NEW INVOICE.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
NEW INVOICE.exeRegSvcs.exepid process 2644 NEW INVOICE.exe 2644 NEW INVOICE.exe 2644 NEW INVOICE.exe 4952 RegSvcs.exe 4952 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
NEW INVOICE.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 2644 NEW INVOICE.exe Token: SeDebugPrivilege 4952 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
NEW INVOICE.exedescription pid process target process PID 2644 wrote to memory of 3180 2644 NEW INVOICE.exe schtasks.exe PID 2644 wrote to memory of 3180 2644 NEW INVOICE.exe schtasks.exe PID 2644 wrote to memory of 3180 2644 NEW INVOICE.exe schtasks.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe PID 2644 wrote to memory of 4952 2644 NEW INVOICE.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\NEW INVOICE.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aVEwpDPWQpr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp37E8.tmp"2⤵
- Creates scheduled task(s)
PID:3180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5085222dc7313d0b8c2002ecea0116262
SHA1b70752ed235166277837a06a002712b9a37d26c2
SHA2568b3dedff782d0941e6e9c3e1696782c869de8801f1353acce1d09191ab7b091f
SHA5125e64eb7e2f7ca69459ae304ef992534b890d7e28d7d0546b6aa4070e499064910939c68b83f2dc42bac568e03700e180b80f88f3db80cf21a29ea9d561eea415