Analysis
-
max time kernel
204s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20220901-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Purchase order.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Purchase order.exe
-
Size
699KB
-
MD5
71473173f728c0ae8c921000619d3950
-
SHA1
dca46a8b23db8f8556858ec18a71a4ef4be9df60
-
SHA256
c042e3d59aa2845f1812cd9b172946cfb60207f81f8faa7350446140ff6b4549
-
SHA512
f07f46b1459bc2db3a65a473d055e655e2e8f98443feb5274e6ba0a3873f4f7a13a2fbd59ac5e261649fc525cfdbe58271bf7f1977ac2838072152245e697e19
-
SSDEEP
12288:2jcWtGDCBpQW7LFc2lI1tmPSbouyoN9bkvzAt08CyqXT:zGBpxB0tmPSNVUCSXT
Score
10/10
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.chamakiotis.gr - Port:
587 - Username:
[email protected] - Password:
Fyr2q?93
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase order.exedescription pid process target process PID 4776 set thread context of 2188 4776 Purchase order.exe Purchase order.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Purchase order.exepid process 2188 Purchase order.exe 2188 Purchase order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Purchase order.exedescription pid process Token: SeDebugPrivilege 2188 Purchase order.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Purchase order.exedescription pid process target process PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe PID 4776 wrote to memory of 2188 4776 Purchase order.exe Purchase order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188