Analysis
-
max time kernel
105s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:59
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order from Arrow Electronics Components.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase order from Arrow Electronics Components.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Tender Documents Arrow Electronics Components.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Tender Documents Arrow Electronics Components.exe
Resource
win10v2004-20220414-en
General
-
Target
Purchase order from Arrow Electronics Components.exe
-
Size
424KB
-
MD5
f094dca28a6ce2605e0fbbf5a119807e
-
SHA1
476167feac646617417834133571878436166918
-
SHA256
b4ccf43f4738a566c201a3320e7ed4a49454359e8d85cc2470fd3caa820d4e29
-
SHA512
72260c47ee5b96729ba5d88c4973b6b118e2f323ebffedeb2da0c3651c48b4c8c0e1e2047372a61fe6f6b737af8da448e146c30a3767c942fec3c000b8f7b26e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.ontime.com.ph - Port:
587 - Username:
[email protected] - Password:
OTelvie1234
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/992-62-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/992-61-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/992-63-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/992-64-0x000000000044676E-mapping.dmp family_agenttesla behavioral1/memory/992-68-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/992-66-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Purchase order from Arrow Electronics Components.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order from Arrow Electronics Components.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order from Arrow Electronics Components.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order from Arrow Electronics Components.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase order from Arrow Electronics Components.exedescription pid process target process PID 1936 set thread context of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Purchase order from Arrow Electronics Components.exePurchase order from Arrow Electronics Components.exepid process 1936 Purchase order from Arrow Electronics Components.exe 992 Purchase order from Arrow Electronics Components.exe 992 Purchase order from Arrow Electronics Components.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase order from Arrow Electronics Components.exePurchase order from Arrow Electronics Components.exedescription pid process Token: SeDebugPrivilege 1936 Purchase order from Arrow Electronics Components.exe Token: SeDebugPrivilege 992 Purchase order from Arrow Electronics Components.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Purchase order from Arrow Electronics Components.exedescription pid process target process PID 1936 wrote to memory of 624 1936 Purchase order from Arrow Electronics Components.exe schtasks.exe PID 1936 wrote to memory of 624 1936 Purchase order from Arrow Electronics Components.exe schtasks.exe PID 1936 wrote to memory of 624 1936 Purchase order from Arrow Electronics Components.exe schtasks.exe PID 1936 wrote to memory of 624 1936 Purchase order from Arrow Electronics Components.exe schtasks.exe PID 1936 wrote to memory of 1000 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 1000 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 1000 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 1000 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe PID 1936 wrote to memory of 992 1936 Purchase order from Arrow Electronics Components.exe Purchase order from Arrow Electronics Components.exe -
outlook_office_path 1 IoCs
Processes:
Purchase order from Arrow Electronics Components.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order from Arrow Electronics Components.exe -
outlook_win_path 1 IoCs
Processes:
Purchase order from Arrow Electronics Components.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order from Arrow Electronics Components.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order from Arrow Electronics Components.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order from Arrow Electronics Components.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZaGARaFt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDB14.tmp"2⤵
- Creates scheduled task(s)
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Purchase order from Arrow Electronics Components.exe"{path}"2⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Purchase order from Arrow Electronics Components.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5431a982124ca2add4dbca57de68b69bf
SHA14e540aaa6ce3262b0e78f3f4263a7fd38faf50ed
SHA256b0bbe5794ac0a7ca8de77d6ffad3463566cc04bc5e0373179a3a9af18f5d0cd5
SHA5125ac7baed42119520ae82682a303780e0668e2ecb81d08a144dbc8ab8e2fc03e6ca3060b9db7b860a5a4cc82bbd8a1d6ce5fecf19d1da6772d8c1c674809ef48b