Analysis
-
max time kernel
183s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20221111-en
General
-
Target
invoice.exe
-
Size
1.1MB
-
MD5
f683d81b0a64bbd11cf5f21ec12da54c
-
SHA1
646df1c5b6d45e01e1e042ffe9e46f820ecc5b4c
-
SHA256
c018bc22c700a8f6e4100b843d3a96b2409d6c215e1062608fd73714236764fd
-
SHA512
8dc81a8a3df22fdacaf3baa5e8226de0087f9d7a80d9ffd4015b3407e3e534e03027d0b1a5960f25972b995c54ffd52780c9483bdb07cdde17e79a0b3578980c
-
SSDEEP
24576:PGIGAA2Jim+0u1zHoVXGkQgylZUcHfOVjqdOpd:eGJJhLu1rcGkKd4jqdO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.biateknos.com - Port:
587 - Username:
[email protected] - Password:
biateknossutinah - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\DnDcR = "C:\\Users\\Admin\\AppData\\Roaming\\DnDcR\\DnDcR.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
invoice.exedescription pid process target process PID 2028 set thread context of 1416 2028 invoice.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
invoice.exepowershell.exeRegSvcs.exepid process 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 2028 invoice.exe 1340 powershell.exe 1416 RegSvcs.exe 1416 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
invoice.exeRegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 2028 invoice.exe Token: SeDebugPrivilege 1416 RegSvcs.exe Token: SeDebugPrivilege 1340 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 1416 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
invoice.exedescription pid process target process PID 2028 wrote to memory of 1340 2028 invoice.exe powershell.exe PID 2028 wrote to memory of 1340 2028 invoice.exe powershell.exe PID 2028 wrote to memory of 1340 2028 invoice.exe powershell.exe PID 2028 wrote to memory of 1340 2028 invoice.exe powershell.exe PID 2028 wrote to memory of 860 2028 invoice.exe schtasks.exe PID 2028 wrote to memory of 860 2028 invoice.exe schtasks.exe PID 2028 wrote to memory of 860 2028 invoice.exe schtasks.exe PID 2028 wrote to memory of 860 2028 invoice.exe schtasks.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe PID 2028 wrote to memory of 1416 2028 invoice.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\APnYJOITdLj.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\APnYJOITdLj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA545.tmp"2⤵
- Creates scheduled task(s)
PID:860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a08611b381052dccd75e0b4170da05ad
SHA15cdaa8f7a96622e8551d24cc8cb374db20d9395c
SHA256aacbf95cfb7b040a6feeb7f9b87a781a020fd70ff9b2edde27277b3207287cc4
SHA51282198438c02a4c40ff71796c6f87e803963b0db60ab8af5cb0c3edbf9581ca778f9dccefe3b0eeb47d576d63026774b9041ae20d7e207af445ee498ccd508b7c