Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
New DHL Invoice 573872845.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New DHL Invoice 573872845.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Your new invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Your new invoice.exe
Resource
win10v2004-20220414-en
General
-
Target
Your new invoice.exe
-
Size
708KB
-
MD5
02420e23c994fe9b27f459a0e0cb414a
-
SHA1
7e5b848423bc957f12a25907bafeeef7c97c3966
-
SHA256
d83429370b6d814b6ff67dd1736424db4e11e39ee745867f09c98f49fae4e1fc
-
SHA512
36f39db5a1e28dcfcdcbc6aa84d5c94be3a475ff95041fe21cf8f32c8d44a54fb2db1fddda322b9b9f85163152a41f905d95f93895455873c770da876430c3e3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.greenhornechem.com - Port:
587 - Username:
[email protected] - Password:
^fpNyGmQa2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral3/memory/1280-64-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/1280-65-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/1280-66-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/1280-67-0x000000000044703E-mapping.dmp family_agenttesla behavioral3/memory/1280-69-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral3/memory/1280-71-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Your new invoice.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Your new invoice.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Your new invoice.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Your new invoice.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Your new invoice.exedescription pid process target process PID 1544 set thread context of 1280 1544 Your new invoice.exe Your new invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Your new invoice.exeYour new invoice.exepid process 1544 Your new invoice.exe 1544 Your new invoice.exe 1544 Your new invoice.exe 1544 Your new invoice.exe 1280 Your new invoice.exe 1280 Your new invoice.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Your new invoice.exeYour new invoice.exedescription pid process Token: SeDebugPrivilege 1544 Your new invoice.exe Token: SeDebugPrivilege 1280 Your new invoice.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Your new invoice.exedescription pid process target process PID 1544 wrote to memory of 1804 1544 Your new invoice.exe schtasks.exe PID 1544 wrote to memory of 1804 1544 Your new invoice.exe schtasks.exe PID 1544 wrote to memory of 1804 1544 Your new invoice.exe schtasks.exe PID 1544 wrote to memory of 1804 1544 Your new invoice.exe schtasks.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe PID 1544 wrote to memory of 1280 1544 Your new invoice.exe Your new invoice.exe -
outlook_office_path 1 IoCs
Processes:
Your new invoice.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Your new invoice.exe -
outlook_win_path 1 IoCs
Processes:
Your new invoice.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Your new invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Your new invoice.exe"C:\Users\Admin\AppData\Local\Temp\Your new invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB7BC.tmp"2⤵
- Creates scheduled task(s)
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\Your new invoice.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1280
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc436ff5b60ef8168376c73a193ed25c
SHA10943c8a1a0851b7b79d31fadb488cce2e0444638
SHA256949ee6cece73e1304479fc963d79d2fd8e6410f451c1ce0ae6fd6e1b40b70705
SHA5121f66711762ef86444a1e4edd5e3105b2ca5e83ec72bc6c2e04c7b5a9de1f50df3a6a85c75fc54003e4ebb0c9d8061455a6ef2e544726536592fb32dbf99736bd