Analysis
-
max time kernel
184s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:43
Static task
static1
Behavioral task
behavioral1
Sample
RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe
Resource
win10v2004-20220414-en
General
-
Target
RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe
-
Size
2.1MB
-
MD5
3200ae4f6dc2898755658b198ce4482f
-
SHA1
4ba054467be75935e81245d4258a4e82ce60fd59
-
SHA256
826f7d92ad363ef5588a9d983b76899cd45279c201e2af459a38ef034527bf06
-
SHA512
8fdf74582ff2f0a1c518391d17bcb478a5e564b3a2c43062d314406bdbe9116cdf673a5cdcdae31578fc0659d2f2be552cc1cacf44a4aa6d81abc03dd5477704
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.parshavayealborz.com - Port:
587 - Username:
[email protected] - Password:
P@rshava123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1252-89-0x00000000000C0000-0x0000000000112000-memory.dmp family_agenttesla behavioral1/memory/1252-94-0x000000000010C43E-mapping.dmp family_agenttesla behavioral1/memory/1252-95-0x00000000000C0000-0x0000000000112000-memory.dmp family_agenttesla behavioral1/memory/1252-96-0x00000000000C0000-0x0000000000112000-memory.dmp family_agenttesla -
ReZer0 packer 2 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/972-56-0x0000000008E50000-0x000000000900A000-memory.dmp rezer0 behavioral1/memory/2004-69-0x0000000007D50000-0x0000000007ED0000-memory.dmp rezer0 -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
Processes:
MSBuild.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts MSBuild.exe -
Drops startup file 1 IoCs
Processes:
RegSvcs.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ReAgentc.url RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\CpSnJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CpSnJ\\CpSnJ.exe" MSBuild.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/776-75-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral1/memory/776-77-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral1/memory/776-79-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral1/memory/776-81-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral1/memory/776-82-0x000000000042800A-mapping.dmp autoit_exe behavioral1/memory/776-85-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe behavioral1/memory/776-86-0x0000000000400000-0x0000000000579000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exeRegSvcs.exeRegSvcs.exedescription pid process target process PID 972 set thread context of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 2004 set thread context of 776 2004 RegSvcs.exe RegSvcs.exe PID 776 set thread context of 1252 776 RegSvcs.exe MSBuild.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
MSBuild.exeRegSvcs.exepid process 1252 MSBuild.exe 1252 MSBuild.exe 776 RegSvcs.exe 776 RegSvcs.exe 776 RegSvcs.exe 776 RegSvcs.exe 776 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 1252 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
RegSvcs.exepid process 776 RegSvcs.exe 776 RegSvcs.exe 776 RegSvcs.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
RegSvcs.exepid process 776 RegSvcs.exe 776 RegSvcs.exe 776 RegSvcs.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exeRegSvcs.exeRegSvcs.exeMSBuild.exedescription pid process target process PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 972 wrote to memory of 2004 972 RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 2004 wrote to memory of 776 2004 RegSvcs.exe RegSvcs.exe PID 776 wrote to memory of 1252 776 RegSvcs.exe MSBuild.exe PID 776 wrote to memory of 1252 776 RegSvcs.exe MSBuild.exe PID 776 wrote to memory of 1252 776 RegSvcs.exe MSBuild.exe PID 776 wrote to memory of 1252 776 RegSvcs.exe MSBuild.exe PID 776 wrote to memory of 1252 776 RegSvcs.exe MSBuild.exe PID 776 wrote to memory of 1252 776 RegSvcs.exe MSBuild.exe PID 1252 wrote to memory of 1892 1252 MSBuild.exe REG.exe PID 1252 wrote to memory of 1892 1252 MSBuild.exe REG.exe PID 1252 wrote to memory of 1892 1252 MSBuild.exe REG.exe PID 1252 wrote to memory of 1892 1252 MSBuild.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe"C:\Users\Admin\AppData\Local\Temp\RFQ- PT MULYA MANDIRI NEW ORDER PO 02.27.20.doc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"4⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
PID:1892