Analysis
-
max time kernel
156s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:02
Static task
static1
Behavioral task
behavioral1
Sample
FIRST PURCHASE ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
FIRST PURCHASE ORDER.exe
Resource
win10v2004-20220414-en
General
-
Target
FIRST PURCHASE ORDER.exe
-
Size
733KB
-
MD5
7049a8a60d535e335ad3ba4f32ac5b14
-
SHA1
a41c7239026a2820c2e79fa2b3e9e29194517c17
-
SHA256
40a33fa7eeec1caf0ee27f87a4c3d8fd8f1475789191a1693329e2fa154b02a2
-
SHA512
9755c2f86e208fdf9a6440cd2d1ad8c41e84425d55894d85a03b867c4a7a4ee76f7dfeee08881a1c2ea57ac1f64d1561db268be13349524d63b9cf5a72d8aec0
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1252-137-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FIRST PURCHASE ORDER.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation FIRST PURCHASE ORDER.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sLbGMVN = "C:\\Users\\Admin\\AppData\\Roaming\\sLbGMVN\\sLbGMVN.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
FIRST PURCHASE ORDER.exedescription pid process target process PID 4480 set thread context of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
FIRST PURCHASE ORDER.exeRegSvcs.exepid process 4480 FIRST PURCHASE ORDER.exe 1252 RegSvcs.exe 1252 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
FIRST PURCHASE ORDER.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4480 FIRST PURCHASE ORDER.exe Token: SeDebugPrivilege 1252 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
FIRST PURCHASE ORDER.exedescription pid process target process PID 4480 wrote to memory of 1532 4480 FIRST PURCHASE ORDER.exe schtasks.exe PID 4480 wrote to memory of 1532 4480 FIRST PURCHASE ORDER.exe schtasks.exe PID 4480 wrote to memory of 1532 4480 FIRST PURCHASE ORDER.exe schtasks.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe PID 4480 wrote to memory of 1252 4480 FIRST PURCHASE ORDER.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FIRST PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\FIRST PURCHASE ORDER.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KdxcgWbpygExaT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FEE.tmp"2⤵
- Creates scheduled task(s)
PID:1532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d52157dbb92f9fd04c086be4407ce703
SHA1a4b149f60c58a368e2da9cab1e9e7d641a7e27aa
SHA2564347506e1639045cd82bcadfeaf39dd6a7eee99d4110b1cc801bf88977ccb0cf
SHA51285da4ccc0f00a1e30f9ead470a83259aa212bef95e6a0cbd2c178ec88cacae78df0b42dcf1e4b0279823c03f5c7f8f7e4ba40858ec3f6d5a54009782dcfe7d0a