Analysis
-
max time kernel
182s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20221111-en
General
-
Target
invoice.exe
-
Size
1.1MB
-
MD5
f683d81b0a64bbd11cf5f21ec12da54c
-
SHA1
646df1c5b6d45e01e1e042ffe9e46f820ecc5b4c
-
SHA256
c018bc22c700a8f6e4100b843d3a96b2409d6c215e1062608fd73714236764fd
-
SHA512
8dc81a8a3df22fdacaf3baa5e8226de0087f9d7a80d9ffd4015b3407e3e534e03027d0b1a5960f25972b995c54ffd52780c9483bdb07cdde17e79a0b3578980c
-
SSDEEP
24576:PGIGAA2Jim+0u1zHoVXGkQgylZUcHfOVjqdOpd:eGJJhLu1rcGkKd4jqdO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.biateknos.com - Port:
587 - Username:
[email protected] - Password:
biateknossutinah - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
invoice.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation invoice.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DnDcR = "C:\\Users\\Admin\\AppData\\Roaming\\DnDcR\\DnDcR.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 92 api.ipify.org 93 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
invoice.exedescription pid process target process PID 1484 set thread context of 516 1484 invoice.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
invoice.exepowershell.exeRegSvcs.exepid process 1484 invoice.exe 1484 invoice.exe 1484 invoice.exe 1484 invoice.exe 3720 powershell.exe 3720 powershell.exe 516 RegSvcs.exe 516 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
invoice.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1484 invoice.exe Token: SeDebugPrivilege 3720 powershell.exe Token: SeDebugPrivilege 516 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 516 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
invoice.exedescription pid process target process PID 1484 wrote to memory of 3720 1484 invoice.exe powershell.exe PID 1484 wrote to memory of 3720 1484 invoice.exe powershell.exe PID 1484 wrote to memory of 3720 1484 invoice.exe powershell.exe PID 1484 wrote to memory of 4952 1484 invoice.exe schtasks.exe PID 1484 wrote to memory of 4952 1484 invoice.exe schtasks.exe PID 1484 wrote to memory of 4952 1484 invoice.exe schtasks.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe PID 1484 wrote to memory of 516 1484 invoice.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\APnYJOITdLj.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\APnYJOITdLj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8901.tmp"2⤵
- Creates scheduled task(s)
PID:4952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d05a714492aa2d840409b3f03d6f7a33
SHA13dd4723b4725d4a47c4d401e18dc85a8a55c311b
SHA256df981fec85387968fc43428ae0808040d657dfe12fc84d2a725d97f6b5633f0d
SHA512bec34ba1369a367c53d37b9bda47f2897fb167afbd1b4c7375d3486702055e3d90208f5040c5b8853d92b15186324d91365155476e0e912fd8467ba73fa79b41