Analysis
-
max time kernel
154s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:48
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20220414-en
General
-
Target
PURCHASE ORDER.exe
-
Size
334KB
-
MD5
7fef57af049ab9441f9d219f180c2216
-
SHA1
027a128a7e5a4ad584c062c95759759f8e8616cd
-
SHA256
6e1b968192bdf51820df2d4c83f322000331ecbf6a1f5e6c91301d2bfdf47637
-
SHA512
8fec6c1263710c69c83b66b6020a901558ce5c284d2a8f8b0ea7f720576197091ce136efdb427f288266755218a856a747945f9cacb2ce0c20f5efde739b9470
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wasstech.com - Port:
587 - Username:
promotions@wasstech.com - Password:
Sunray2700@@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3480-133-0x0000000000400000-0x000000000044E000-memory.dmp family_agenttesla -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PURCHASE ORDER.exedescription pid process target process PID 2804 set thread context of 3480 2804 PURCHASE ORDER.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegAsm.exepid process 3480 RegAsm.exe 3480 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
PURCHASE ORDER.exepid process 2804 PURCHASE ORDER.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 3480 RegAsm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
PURCHASE ORDER.exedescription pid process target process PID 2804 wrote to memory of 3480 2804 PURCHASE ORDER.exe RegAsm.exe PID 2804 wrote to memory of 3480 2804 PURCHASE ORDER.exe RegAsm.exe PID 2804 wrote to memory of 3480 2804 PURCHASE ORDER.exe RegAsm.exe PID 2804 wrote to memory of 3480 2804 PURCHASE ORDER.exe RegAsm.exe -
outlook_office_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2804-130-0x0000000000C10000-0x0000000000C6A000-memory.dmpFilesize
360KB
-
memory/2804-132-0x0000000002F20000-0x0000000002F23000-memory.dmpFilesize
12KB
-
memory/3480-131-0x0000000000000000-mapping.dmp
-
memory/3480-133-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/3480-134-0x0000000005D40000-0x00000000062E4000-memory.dmpFilesize
5.6MB
-
memory/3480-135-0x0000000005550000-0x00000000055E2000-memory.dmpFilesize
584KB
-
memory/3480-136-0x0000000005830000-0x00000000058CC000-memory.dmpFilesize
624KB
-
memory/3480-137-0x00000000063F0000-0x0000000006456000-memory.dmpFilesize
408KB
-
memory/3480-138-0x0000000006AA0000-0x0000000006AF0000-memory.dmpFilesize
320KB
-
memory/3480-139-0x00000000069C0000-0x00000000069CA000-memory.dmpFilesize
40KB