Analysis
-
max time kernel
68s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 07:11
Static task
static1
Behavioral task
behavioral1
Sample
advance payment.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
advance payment.exe
Resource
win10v2004-20220812-en
General
-
Target
advance payment.exe
-
Size
566KB
-
MD5
05c01ddc8eb7af8cb3c49dfe101db3f9
-
SHA1
689e211a6e4cdabf6dcd2b0cd20da68c093c6bdb
-
SHA256
90b01e99ca3dc23e4902fb8ea15d61aa872208b47f5ff545561688f19729bfb6
-
SHA512
9a388b483f4a860bcc26ac88925dd820d2e8dd9ebd439118692f978f8375116c7ac10c7d717c6ec36c0dddecceed1e015d0aa81e6f366a9e92e6d554956df027
-
SSDEEP
12288:kB+96l1M2VAIQw1CUHZS2XYgn3A90vvJYRijFo4DViOSkNMSh0:kB+9SLQSHZS2Xhn35hy
Malware Config
Extracted
Protocol: smtp- Host:
mail.qualitysolutions.co.in - Port:
587 - Username:
[email protected] - Password:
9873335231
Extracted
agenttesla
Protocol: smtp- Host:
mail.qualitysolutions.co.in - Port:
587 - Username:
[email protected] - Password:
9873335231 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\yqWDN = "C:\\Users\\Admin\\AppData\\Roaming\\yqWDN\\yqWDN.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 676 1064 advance payment.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1064 advance payment.exe 676 RegSvcs.exe 676 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1064 advance payment.exe Token: SeDebugPrivilege 676 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 advance payment.exe 1064 advance payment.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1064 wrote to memory of 268 1064 advance payment.exe 27 PID 1064 wrote to memory of 268 1064 advance payment.exe 27 PID 1064 wrote to memory of 268 1064 advance payment.exe 27 PID 1064 wrote to memory of 268 1064 advance payment.exe 27 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 PID 1064 wrote to memory of 676 1064 advance payment.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\advance payment.exe"C:\Users\Admin\AppData\Local\Temp\advance payment.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ujeIzgvzxvO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7CCF.tmp"2⤵
- Creates scheduled task(s)
PID:268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c923a73e82c2b014f9a3969d0f673b2c
SHA156a909ae2c1800fdc4fd4b00f55985fe12c34e94
SHA256ffb8108f4ca9972bdecf70b9dc9c3a63919d176b37386eddf967677742249a1d
SHA512e2c3aa0d79b03f27733fee39037c603782c92053ba5d149b27bdad3ca27c2c1a44c2c670e0dfb926ab201103841a9f40a3d60a2331197eed51df79dfbd36d443