Analysis
-
max time kernel
99s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20220812-en
General
-
Target
NEW ORDER.exe
-
Size
1.4MB
-
MD5
313f1f3152ae048a40feae10cb0f78eb
-
SHA1
921d17264e8f00a37bdbfc7f39bc584dfc6a304e
-
SHA256
bc123960f09aa291db84c5e7d73412fad81939bb5a57459e94cd7d522b4ee193
-
SHA512
e0f21448ef4125e815f9eaf670467d6350050b97d8fc530e88710d3abe8b4a205c5d1754f97953f8cb3421e9c6f819cfc2c5149660969d85ba213463c8c2ec65
-
SSDEEP
24576:y8eF+9SnkX6/sR6uxdTVfjktDaHarKu79cR/1vpU:neF+9SnkX6I6sdJjV69i/1vp
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation NEW ORDER.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DHxKjD = "C:\\Users\\Admin\\AppData\\Roaming\\DHxKjD\\DHxKjD.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4240 set thread context of 1036 4240 NEW ORDER.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3172 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4240 NEW ORDER.exe 4240 NEW ORDER.exe 4240 NEW ORDER.exe 1036 RegSvcs.exe 1036 RegSvcs.exe 1036 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4240 NEW ORDER.exe Token: SeDebugPrivilege 1036 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4240 NEW ORDER.exe 4240 NEW ORDER.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3172 4240 NEW ORDER.exe 90 PID 4240 wrote to memory of 3172 4240 NEW ORDER.exe 90 PID 4240 wrote to memory of 3172 4240 NEW ORDER.exe 90 PID 4240 wrote to memory of 60 4240 NEW ORDER.exe 92 PID 4240 wrote to memory of 60 4240 NEW ORDER.exe 92 PID 4240 wrote to memory of 60 4240 NEW ORDER.exe 92 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 PID 4240 wrote to memory of 1036 4240 NEW ORDER.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RYpSlHLaaFaUH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC9F7.tmp"2⤵
- Creates scheduled task(s)
PID:3172
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵PID:60
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5728e285717161e2809ca5df8b425a07a
SHA126c76f61cc06584b5ac9fcf66d594f36fd93fe76
SHA256488b04bf7a067fdde721993ffdd954f1f2ad704825b315508a30102436b29a6b
SHA512686588fe573b42f3b88e127f49e9d00bf5a2df958ca886bfca1c0a7d236689e8a3af53c20d4f3b52d3ba4c6d2654c1ed01116592829ec4c9210ccc434520220b