Analysis
-
max time kernel
72s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advise.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Payment Advise.exe
Resource
win10v2004-20220901-en
General
-
Target
Payment Advise.exe
-
Size
786KB
-
MD5
ddb15a4c31bd7e0e7cf3d7cac8232f5f
-
SHA1
761590b2db740edbe30bf3232998c258062b169a
-
SHA256
fde52c018e73c2ac8a5f52796e06d7f35f9cfb197665d0ddb3dc6729c93cccb8
-
SHA512
d2d5110df0ee93aa294237abaea8e654dc9d620d6e6540366de87888dcba91b1db532c9c2417c42f6d137744cc7a1418167e9997f4a4c03e94c590d3d79a999c
-
SSDEEP
12288:IVmNAcv9ul/Z63ovN9LOfMe/xoKCT6Gx9QzjSCGmZJbxpDF+B7hC8Jf1:smNzV4KoT2c62CG
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chinedu2@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Advise.exedescription pid process target process PID 1180 set thread context of 1292 1180 Payment Advise.exe Payment Advise.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1688 1292 WerFault.exe Payment Advise.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Payment Advise.exepowershell.exepid process 1292 Payment Advise.exe 1292 Payment Advise.exe 772 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Advise.exepowershell.exedescription pid process Token: SeDebugPrivilege 1292 Payment Advise.exe Token: SeDebugPrivilege 772 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Payment Advise.exePayment Advise.exedescription pid process target process PID 1180 wrote to memory of 772 1180 Payment Advise.exe powershell.exe PID 1180 wrote to memory of 772 1180 Payment Advise.exe powershell.exe PID 1180 wrote to memory of 772 1180 Payment Advise.exe powershell.exe PID 1180 wrote to memory of 772 1180 Payment Advise.exe powershell.exe PID 1180 wrote to memory of 1460 1180 Payment Advise.exe schtasks.exe PID 1180 wrote to memory of 1460 1180 Payment Advise.exe schtasks.exe PID 1180 wrote to memory of 1460 1180 Payment Advise.exe schtasks.exe PID 1180 wrote to memory of 1460 1180 Payment Advise.exe schtasks.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1180 wrote to memory of 1292 1180 Payment Advise.exe Payment Advise.exe PID 1292 wrote to memory of 1688 1292 Payment Advise.exe WerFault.exe PID 1292 wrote to memory of 1688 1292 Payment Advise.exe WerFault.exe PID 1292 wrote to memory of 1688 1292 Payment Advise.exe WerFault.exe PID 1292 wrote to memory of 1688 1292 Payment Advise.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KlAOZajcWjJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KlAOZajcWjJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5D6D.tmp"2⤵
- Creates scheduled task(s)
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 6243⤵
- Program crash
PID:1688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55dc02c74482d0bbba10acc87700ff75d
SHA1b6653d51ae1f719f4130872656993ec128adcc8d
SHA25623470ba29e76f2232a270a523cd4d8a97ab5ba1b952073e8ba6526c942215035
SHA512644ffdba9c8eb0e4b32bc53ceb1bbfa2e82986ce5d3956b6633049d2efc5af75b0b42a5cc05e6ff2e3db570bd9084b91fe195a294aaed5150707a62b023fe18e