Analysis
-
max time kernel
171s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2023 19:06
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
purchase order.exe
Resource
win10v2004-20221111-en
General
-
Target
purchase order.exe
-
Size
955KB
-
MD5
83027ceebd07df0f927f780be4dbc729
-
SHA1
acbc3142cac50ab28474f5c8945585e2c07ba81d
-
SHA256
66fcc078741968b04e45e850256bcf6f64506fd143a5b9ebf31b5244d423e277
-
SHA512
c7516c61db56217fa75817f93242ecd5c1add40a59d8cda221f51d6199e11817bc31c8cc808cde3377aa1df1266a6ad36f5022a21163ae4d1d39ece4e18ff2ee
-
SSDEEP
24576:4p1/YGDkjwJsoGlWM9STNNS/GoqMUwwhvgoK3:4ptY5UsoGlxZ/GotU/v
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5615947415:AAHTRsWQ236jQ31p3gNngAMLROoKsqd6tPs/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation purchase order.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 purchase order.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 purchase order.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 purchase order.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DfdZo = "C:\\Users\\Admin\\AppData\\Roaming\\DfdZo\\DfdZo.exe" purchase order.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 api.ipify.org 53 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 3784 1480 purchase order.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1480 purchase order.exe 4940 powershell.exe 1396 powershell.exe 1480 purchase order.exe 4940 powershell.exe 1396 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1480 purchase order.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 1396 powershell.exe Token: SeDebugPrivilege 3784 purchase order.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1480 wrote to memory of 4940 1480 purchase order.exe 83 PID 1480 wrote to memory of 4940 1480 purchase order.exe 83 PID 1480 wrote to memory of 4940 1480 purchase order.exe 83 PID 1480 wrote to memory of 1396 1480 purchase order.exe 85 PID 1480 wrote to memory of 1396 1480 purchase order.exe 85 PID 1480 wrote to memory of 1396 1480 purchase order.exe 85 PID 1480 wrote to memory of 1780 1480 purchase order.exe 87 PID 1480 wrote to memory of 1780 1480 purchase order.exe 87 PID 1480 wrote to memory of 1780 1480 purchase order.exe 87 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 PID 1480 wrote to memory of 3784 1480 purchase order.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 purchase order.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 purchase order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\purchase order.exe"C:\Users\Admin\AppData\Local\Temp\purchase order.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\purchase order.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hUkqfyOvIRph.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hUkqfyOvIRph" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7819.tmp"2⤵
- Creates scheduled task(s)
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\purchase order.exe"C:\Users\Admin\AppData\Local\Temp\purchase order.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
53KB
MD52e78d4469d81d67193bda790789bc661
SHA1173ba6253abaddc0bb245a9cbdf4dc732b03ed41
SHA25654c15d752e6ccec18ca3a7b01e61674134087e0a228580c7077e2cc7d7c4a5fe
SHA5128f66efcb2c908db1167c1d5bcf5ca0dfdacf9b34f56e2aa488fda35ae1e80092dcf03fd0673f99c1c228aa8e48fbe75b819c9cf97cd28be57b945072c93920a4
-
Filesize
18KB
MD553ca0068174cff02013268d387c76ca1
SHA1a6638bf0ac7ca7b25cdbc9492a8dccaf3ca883b0
SHA2565e94ea09158b7572b7be1fb500fab544bf9768d62f437a14962aab965a9259ab
SHA5120a7599e0e37570b262c6e4a5b4f822ab6a4b301d8eb02dd9490f342656829631a905e9556ec3f51cb1f1a5dd0c8ce050c28389e607d0e9d58b272ac9214d6e2f
-
Filesize
1KB
MD5f996e48aac90e9b6cf7b7004eda96cf0
SHA149cf11f5a2016f1ce6fba823174307db6f2e31a3
SHA25693c6a2b04f84c80e51fef02816fb8e44ceac92ed2f8439663b44a1a96dcd9f09
SHA5124183541ecef30756a2f03b72523ffb9f0595d0da1b046451640187878434d7703c82200a0a3abf12195129c024a5ffff78763609ffd0414e32f63b0b64e8967a