Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:17
Static task
static1
Behavioral task
behavioral1
Sample
new order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
new order.exe
Resource
win10v2004-20220414-en
General
-
Target
new order.exe
-
Size
444KB
-
MD5
9d9881934e837298eef34f31bd4fdac6
-
SHA1
1d8e4add2babcd745934a6924efc52a73edf74ee
-
SHA256
1e41a4bc1146c02cf7e2e5f2a040ad3835f4852b675bfef98eeaed0c16d8bee3
-
SHA512
d9e512b4b0765bc050218bed8efcc1c2d07313b3204d1a255cd96b5bf237666ad4f44d7cc41e3cb38b09f35e31cb420391567c27272f4c905d6a25b0785a5c78
Malware Config
Extracted
Protocol: smtp- Host:
mail.yitaipackaging.com - Port:
587 - Username:
[email protected] - Password:
22799213
Extracted
agenttesla
Protocol: smtp- Host:
mail.yitaipackaging.com - Port:
587 - Username:
[email protected] - Password:
22799213
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
suricata: ET MALWARE AgentTesla Exfil Via SMTP
suricata: ET MALWARE AgentTesla Exfil Via SMTP
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4604-136-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
Processes:
new order.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts new order.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
new order.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation new order.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
new order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
new order.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gKWBf = "C:\\Users\\Admin\\AppData\\Roaming\\gKWBf\\gKWBf.exe" new order.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
new order.exedescription pid process target process PID 2804 set thread context of 4604 2804 new order.exe new order.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
new order.exenew order.exepid process 2804 new order.exe 2804 new order.exe 2804 new order.exe 2804 new order.exe 2804 new order.exe 2804 new order.exe 2804 new order.exe 4604 new order.exe 4604 new order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
new order.exenew order.exedescription pid process Token: SeDebugPrivilege 2804 new order.exe Token: SeDebugPrivilege 4604 new order.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
new order.exenew order.exedescription pid process target process PID 2804 wrote to memory of 2552 2804 new order.exe schtasks.exe PID 2804 wrote to memory of 2552 2804 new order.exe schtasks.exe PID 2804 wrote to memory of 2552 2804 new order.exe schtasks.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 2804 wrote to memory of 4604 2804 new order.exe new order.exe PID 4604 wrote to memory of 2120 4604 new order.exe REG.exe PID 4604 wrote to memory of 2120 4604 new order.exe REG.exe PID 4604 wrote to memory of 2120 4604 new order.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
new order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order.exe -
outlook_win_path 1 IoCs
Processes:
new order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\new order.exe"C:\Users\Admin\AppData\Local\Temp\new order.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xbxCRaah" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4EBC.tmp"2⤵
- Creates scheduled task(s)
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\new order.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4604 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:2120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD5ad1c7f6525cfeb54c0487efd38b0e26c
SHA1ed3da94723ac7e3828a9e93d68418bb810592f3b
SHA2560a534a3d0fa82e6a427164c5f6e702cac7e4afc9967af9bc5ddba4f84ab33276
SHA51248d625e6be5391d91d95c2850226fe39bb2411cb72139797699cfe126e6b066182e83950a8ea67e63b64a66b0d45f58d8bc97cab0363d55c2fd88c0d1d28009c
-
Filesize
1KB
MD5259bf89868bda1b551941f3ea78a8c7c
SHA19b430ece52cea3d8160a706dd1d029b4bf9ac3f2
SHA256babc6606ae55c0205c5c4626a20988396dc0d8060121f6fdee2a5cc13a84c62b
SHA5123eb7974f92f5392284808505419f403006a45822d001b1001e19276c62d888c7c1fff95ebbd9ae947baa42e0b1aae88cc27a87284bf9384451c56fa09c7c3c5e