Analysis
-
max time kernel
58s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-12-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
Order description pdf..exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Order description pdf..exe
Resource
win10v2004-20220901-en
General
-
Target
Order description pdf..exe
-
Size
975KB
-
MD5
f7a0e3f3b22d8217ab66885e1cc0d0c1
-
SHA1
d742bd8e3c27cb28167bd2e35581b6ffa43506a7
-
SHA256
91ad5e288cc86d88bb3189716581fcd1bc5d0f13b2be3a471c8758fd97bfda69
-
SHA512
f1fd19d21a0c400dfd7b4a0aebebe44087b3682bb660535710c999e720ea91bb94a6eb6aef6fdbb459596c173f900f508def36b5ac510e38226040461a48a4a1
-
SSDEEP
12288:729yFz+GPtdUAPULHhhhZ+b/qTsjKsA/m74CQ+9pY+ZmBjHUk+qhK3o3cieQU7:KSzFl9PUDebxjM/u4+hZmBH+eeZ
Malware Config
Extracted
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
a^m %0E DAg Q$G
Extracted
agenttesla
Protocol: smtp- Host:
host39.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
a^m %0E DAg Q$G
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Order description pdf..exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order description pdf..exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order description pdf..exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order description pdf..exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order description pdf..exedescription pid process target process PID 1888 set thread context of 772 1888 Order description pdf..exe Order description pdf..exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Order description pdf..exepid process 772 Order description pdf..exe 772 Order description pdf..exe 772 Order description pdf..exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Order description pdf..exedescription pid process Token: SeDebugPrivilege 772 Order description pdf..exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Order description pdf..exedescription pid process target process PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe PID 1888 wrote to memory of 772 1888 Order description pdf..exe Order description pdf..exe -
outlook_office_path 1 IoCs
Processes:
Order description pdf..exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order description pdf..exe -
outlook_win_path 1 IoCs
Processes:
Order description pdf..exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order description pdf..exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order description pdf..exe"C:\Users\Admin\AppData\Local\Temp\Order description pdf..exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Order description pdf..exe"C:\Users\Admin\AppData\Local\Temp\Order description pdf..exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:772
-