Analysis

  • max time kernel
    156s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 00:02

General

  • Target

    FIRST PURCHASE ORDER.exe

  • Size

    733KB

  • MD5

    7049a8a60d535e335ad3ba4f32ac5b14

  • SHA1

    a41c7239026a2820c2e79fa2b3e9e29194517c17

  • SHA256

    40a33fa7eeec1caf0ee27f87a4c3d8fd8f1475789191a1693329e2fa154b02a2

  • SHA512

    9755c2f86e208fdf9a6440cd2d1ad8c41e84425d55894d85a03b867c4a7a4ee76f7dfeee08881a1c2ea57ac1f64d1561db268be13349524d63b9cf5a72d8aec0

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aquariuslogistics.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AQL@2019#$

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FIRST PURCHASE ORDER.exe
    "C:\Users\Admin\AppData\Local\Temp\FIRST PURCHASE ORDER.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KdxcgWbpygExaT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7FEE.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "{path}"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp7FEE.tmp

    Filesize

    1KB

    MD5

    d52157dbb92f9fd04c086be4407ce703

    SHA1

    a4b149f60c58a368e2da9cab1e9e7d641a7e27aa

    SHA256

    4347506e1639045cd82bcadfeaf39dd6a7eee99d4110b1cc801bf88977ccb0cf

    SHA512

    85da4ccc0f00a1e30f9ead470a83259aa212bef95e6a0cbd2c178ec88cacae78df0b42dcf1e4b0279823c03f5c7f8f7e4ba40858ec3f6d5a54009782dcfe7d0a

  • memory/1252-136-0x0000000000000000-mapping.dmp

  • memory/1252-137-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1252-138-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/1252-139-0x0000000006C10000-0x0000000006C60000-memory.dmp

    Filesize

    320KB

  • memory/1532-134-0x0000000000000000-mapping.dmp

  • memory/4480-130-0x0000000000700000-0x00000000007BE000-memory.dmp

    Filesize

    760KB

  • memory/4480-131-0x0000000005610000-0x0000000005BB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4480-132-0x0000000005150000-0x00000000051E2000-memory.dmp

    Filesize

    584KB

  • memory/4480-133-0x0000000005290000-0x000000000532C000-memory.dmp

    Filesize

    624KB