Analysis
-
max time kernel
146s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:52
Static task
static1
Behavioral task
behavioral1
Sample
order product list.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
order product list.exe
Resource
win10v2004-20220414-en
General
-
Target
order product list.exe
-
Size
574KB
-
MD5
b7d4ecf747a1e5a4a04179f775c50abb
-
SHA1
d0e4ebcf70a56c9c57f96e94f54aae9749a4ac3d
-
SHA256
fc6d76b83d4292945015a7a7b9440f510732a070d9d1cefd26fc3d46591cca9f
-
SHA512
5ae36c69ef09d9ae7677094ad7928031b6cf484bbde606a9e74fd10d0e6f0c3cbd45c7f16e5b93a1a1f4dedda82ce1a0ed3d61e6482e01617935ef96a3a53f15
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.goa-usa.com - Port:
587 - Username:
[email protected] - Password:
SQeUpB%7
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2416-138-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
order product list.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation order product list.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
order product list.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 order product list.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 order product list.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 order product list.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
order product list.exedescription pid process target process PID 5056 set thread context of 2416 5056 order product list.exe order product list.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
order product list.exepid process 2416 order product list.exe 2416 order product list.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
order product list.exedescription pid process Token: SeDebugPrivilege 2416 order product list.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
order product list.exepid process 2416 order product list.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
order product list.exeorder product list.exedescription pid process target process PID 5056 wrote to memory of 4444 5056 order product list.exe schtasks.exe PID 5056 wrote to memory of 4444 5056 order product list.exe schtasks.exe PID 5056 wrote to memory of 4444 5056 order product list.exe schtasks.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 5056 wrote to memory of 2416 5056 order product list.exe order product list.exe PID 2416 wrote to memory of 4652 2416 order product list.exe netsh.exe PID 2416 wrote to memory of 4652 2416 order product list.exe netsh.exe PID 2416 wrote to memory of 4652 2416 order product list.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
order product list.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 order product list.exe -
outlook_win_path 1 IoCs
Processes:
order product list.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 order product list.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\order product list.exe"C:\Users\Admin\AppData\Local\Temp\order product list.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CjrPimTz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3AF6.tmp"2⤵
- Creates scheduled task(s)
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\order product list.exe"C:\Users\Admin\AppData\Local\Temp\order product list.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2416 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:4652
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
1KB
MD5f4993fe3179c56ba8e181057a75cac26
SHA1697f5044bf6db48eed0ee18048fb272afc909512
SHA256fc81225c08d1ea05b30ba8ff37d2821db215c023830142836481abc4d7c42f32
SHA512e9d20b61fddf9274266356f80c1995f2fb74fdf2e15f7d3f15f4fbacd2c07490672023ce01f669bcc0b030780c7554827bd451bb948e06faf0622facb356afa9