Analysis
-
max time kernel
81s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 09:10
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
Purchase order.exe
Resource
win10v2004-20220721-en
General
-
Target
Purchase order.exe
-
Size
744KB
-
MD5
24b0be710ed42b1ec10224db8db55bf6
-
SHA1
597bce6e93351125632e9b92fb2ca35fca8bc75d
-
SHA256
89823f7c472a09c6062578082579da7f8cdb093c99de1a7c92aafa5d741c7316
-
SHA512
810fb68f0199f3bf35b7e8894b9a978ad4533de9a9b8c6d0e39e260688ae77c6f922a71557f0812fdb815951500d6712eb16d6cae847701c5e0aec9e91af3bd4
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5573921253:AAHXKq7lrmioCzUGP-9p7lopfbVX0A_ZdQA/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Purchase order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase order.exedescription pid process target process PID 1908 set thread context of 1148 1908 Purchase order.exe Purchase order.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Purchase order.exePurchase order.exepowershell.exepowershell.exepid process 1908 Purchase order.exe 1908 Purchase order.exe 1148 Purchase order.exe 1148 Purchase order.exe 944 powershell.exe 824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Purchase order.exePurchase order.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1908 Purchase order.exe Token: SeDebugPrivilege 1148 Purchase order.exe Token: SeDebugPrivilege 944 powershell.exe Token: SeDebugPrivilege 824 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Purchase order.exedescription pid process target process PID 1908 wrote to memory of 824 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 824 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 824 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 824 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 944 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 944 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 944 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 944 1908 Purchase order.exe powershell.exe PID 1908 wrote to memory of 1096 1908 Purchase order.exe schtasks.exe PID 1908 wrote to memory of 1096 1908 Purchase order.exe schtasks.exe PID 1908 wrote to memory of 1096 1908 Purchase order.exe schtasks.exe PID 1908 wrote to memory of 1096 1908 Purchase order.exe schtasks.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe PID 1908 wrote to memory of 1148 1908 Purchase order.exe Purchase order.exe -
outlook_office_path 1 IoCs
Processes:
Purchase order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe -
outlook_win_path 1 IoCs
Processes:
Purchase order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zwLLFjVv.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zwLLFjVv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD97E.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpD97E.tmpFilesize
1KB
MD5588bdf7a404acf9d31aba60a284fc4fd
SHA192aaad6423b3c57b67a08272bc6e5fc3af4cbcdd
SHA256d70923db05277982adb1cf74b40c5196c2f46e84a8f69b8159997c85026610cb
SHA5120ecf17e6980902351baa60c252e2d90ba6a84703514d66674e3bc39630d55df10357f4a373da24034cfc6188fafa27cfb818a3ccf4d9803dda6531004ea14a29
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5177b21b006be77140f7a33dc626ab599
SHA184740b0f7b94134dab43a48efd1d08b2176363f1
SHA256e381193f08640feb40ae435d5c2369888c16e44b10eb8f59b8b77aa44adc8d0a
SHA5122ae75b3bec9e79d9482f37ba53cb57846deeb51c33d92bc6386cd2d728154863f019fac9cea2ef35e376f5968a694d0279018fbeb8f9de6746397a74718e5aae
-
memory/824-82-0x000000006ECD0000-0x000000006F27B000-memory.dmpFilesize
5.7MB
-
memory/824-80-0x000000006ECD0000-0x000000006F27B000-memory.dmpFilesize
5.7MB
-
memory/824-59-0x0000000000000000-mapping.dmp
-
memory/944-81-0x000000006ECD0000-0x000000006F27B000-memory.dmpFilesize
5.7MB
-
memory/944-79-0x000000006ECD0000-0x000000006F27B000-memory.dmpFilesize
5.7MB
-
memory/944-61-0x0000000000000000-mapping.dmp
-
memory/1096-62-0x0000000000000000-mapping.dmp
-
memory/1148-72-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1148-73-0x0000000000435CCE-mapping.dmp
-
memory/1148-68-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1148-67-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1148-70-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1148-71-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1148-77-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1148-75-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1908-66-0x0000000004C00000-0x0000000004C3C000-memory.dmpFilesize
240KB
-
memory/1908-54-0x0000000000C20000-0x0000000000CE0000-memory.dmpFilesize
768KB
-
memory/1908-58-0x0000000005330000-0x00000000053A2000-memory.dmpFilesize
456KB
-
memory/1908-57-0x00000000004D0000-0x00000000004DA000-memory.dmpFilesize
40KB
-
memory/1908-56-0x0000000000360000-0x000000000037E000-memory.dmpFilesize
120KB
-
memory/1908-55-0x0000000076321000-0x0000000076323000-memory.dmpFilesize
8KB