Analysis
-
max time kernel
123s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
Commerical invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Commerical invoice.exe
Resource
win10v2004-20220414-en
General
-
Target
Commerical invoice.exe
-
Size
474KB
-
MD5
29e84bff08f40b0ad47e415e284c2b6d
-
SHA1
cd4ecfb91c6504bd8fe2da366298a28877f4da9a
-
SHA256
55a99c172ecc21abb477851da63336dbc01c67bc90f11d08dacd3ac2995e82be
-
SHA512
a39de205f7c07a8268acd4e9986d76ffa5b17849d7a7afa67283a509649a3d0b2e1d61533bc3bbc5c6a1c827cc18492175c5233e1c045a4f502794c4e78623be
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
vicanto1994
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3696-138-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Commerical invoice.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Commerical invoice.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Commerical invoice.exedescription pid process target process PID 3020 set thread context of 3696 3020 Commerical invoice.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Commerical invoice.exeMSBuild.exepid process 3020 Commerical invoice.exe 3020 Commerical invoice.exe 3020 Commerical invoice.exe 3020 Commerical invoice.exe 3020 Commerical invoice.exe 3020 Commerical invoice.exe 3696 MSBuild.exe 3696 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Commerical invoice.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 3020 Commerical invoice.exe Token: SeDebugPrivilege 3696 MSBuild.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Commerical invoice.exedescription pid process target process PID 3020 wrote to memory of 3880 3020 Commerical invoice.exe schtasks.exe PID 3020 wrote to memory of 3880 3020 Commerical invoice.exe schtasks.exe PID 3020 wrote to memory of 3880 3020 Commerical invoice.exe schtasks.exe PID 3020 wrote to memory of 1572 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 1572 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 1572 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe PID 3020 wrote to memory of 3696 3020 Commerical invoice.exe MSBuild.exe -
outlook_office_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Commerical invoice.exe"C:\Users\Admin\AppData\Local\Temp\Commerical invoice.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NOBmSmPCwYqK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4892.tmp"2⤵
- Creates scheduled task(s)
PID:3880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵PID:1572
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cd27f0dfe82200a0ed5990104662706c
SHA11f3ba375278ace9a326fddf276e36bfd65d064fa
SHA25631918359453d719b0b697c8fe73d7259945ee7a099902ce519c19dd0de6b1c0d
SHA5129877ffe61f12dcb1c4ec18c6e503906c49e4d6be35b43d752c07c7c587013b98ae6269994a69426c0455af766495caf9b5bcea27d3c8cd356f89c94d8a58d639