Analysis
-
max time kernel
111s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advise.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Payment Advise.exe
Resource
win10v2004-20220901-en
General
-
Target
Payment Advise.exe
-
Size
786KB
-
MD5
ddb15a4c31bd7e0e7cf3d7cac8232f5f
-
SHA1
761590b2db740edbe30bf3232998c258062b169a
-
SHA256
fde52c018e73c2ac8a5f52796e06d7f35f9cfb197665d0ddb3dc6729c93cccb8
-
SHA512
d2d5110df0ee93aa294237abaea8e654dc9d620d6e6540366de87888dcba91b1db532c9c2417c42f6d137744cc7a1418167e9997f4a4c03e94c590d3d79a999c
-
SSDEEP
12288:IVmNAcv9ul/Z63ovN9LOfMe/xoKCT6Gx9QzjSCGmZJbxpDF+B7hC8Jf1:smNzV4KoT2c62CG
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
chinedu2@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Payment Advise.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Payment Advise.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Advise.exedescription pid process target process PID 2824 set thread context of 1812 2824 Payment Advise.exe Payment Advise.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2960 1812 WerFault.exe Payment Advise.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Payment Advise.exepowershell.exePayment Advise.exepid process 2824 Payment Advise.exe 2824 Payment Advise.exe 2340 powershell.exe 1812 Payment Advise.exe 1812 Payment Advise.exe 2340 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Payment Advise.exepowershell.exePayment Advise.exedescription pid process Token: SeDebugPrivilege 2824 Payment Advise.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 1812 Payment Advise.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Payment Advise.exedescription pid process target process PID 2824 wrote to memory of 2340 2824 Payment Advise.exe powershell.exe PID 2824 wrote to memory of 2340 2824 Payment Advise.exe powershell.exe PID 2824 wrote to memory of 2340 2824 Payment Advise.exe powershell.exe PID 2824 wrote to memory of 3940 2824 Payment Advise.exe schtasks.exe PID 2824 wrote to memory of 3940 2824 Payment Advise.exe schtasks.exe PID 2824 wrote to memory of 3940 2824 Payment Advise.exe schtasks.exe PID 2824 wrote to memory of 3432 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 3432 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 3432 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe PID 2824 wrote to memory of 1812 2824 Payment Advise.exe Payment Advise.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KlAOZajcWjJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KlAOZajcWjJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7678.tmp"2⤵
- Creates scheduled task(s)
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"2⤵PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 10043⤵
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1812 -ip 18121⤵PID:3944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f393440d98a7632a104a250a31fcef76
SHA1e3714011f7472529e33b74fc77d2e77d6adbc350
SHA256b703c8a23b8b286cce656dfdb20ce95fb0589b8bb3ef16ee6845dc907428738b
SHA512412bfa210b3411732ebe55e172bb4374f22a7280cf8e645037d1b2afbbd5f08a17105b84aa953a418aa31c9b0a549e4b379c92855d3045c4ebca8117ad138885