Analysis
-
max time kernel
71s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/03/2023, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
BALANCE OF NOV AND DEC 2022 PAYMENT.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BALANCE OF NOV AND DEC 2022 PAYMENT.exe
Resource
win10v2004-20230220-en
General
-
Target
BALANCE OF NOV AND DEC 2022 PAYMENT.exe
-
Size
1.1MB
-
MD5
15e578cd9482571c90c0bf2d48181fca
-
SHA1
7fcb58a5d4a6f479b72500344b34352ac9366d26
-
SHA256
06075b49f2b94cccbd7ffadc3fd0db2d2e47a4888f749cbb3685904146ff613a
-
SHA512
997724f090c4a6c65c6ca85374b9468abb66891bd5579e4743053538593942e952560f00e6636082dc88934cc343eea2ef62c257ba66a04adede68aadf86d580
-
SSDEEP
12288:0UNWShbopAJkP3TI88GefCAu3sMlKEEhdMBzJjX6p975a/XffDMaPbnud:WAj8Lua8MlrBzJjXO9cPfoajnu
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bosphoreqroup.com - Port:
587 - Username:
[email protected] - Password:
password2022@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\yGbzOMp = "C:\\Users\\Admin\\AppData\\Roaming\\yGbzOMp\\yGbzOMp.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1392 set thread context of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 672 powershell.exe 1072 powershell.exe 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe Token: SeDebugPrivilege 1072 powershell.exe Token: SeDebugPrivilege 672 powershell.exe Token: SeDebugPrivilege 952 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1392 wrote to memory of 672 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 28 PID 1392 wrote to memory of 672 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 28 PID 1392 wrote to memory of 672 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 28 PID 1392 wrote to memory of 672 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 28 PID 1392 wrote to memory of 1072 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 30 PID 1392 wrote to memory of 1072 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 30 PID 1392 wrote to memory of 1072 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 30 PID 1392 wrote to memory of 1072 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 30 PID 1392 wrote to memory of 520 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 31 PID 1392 wrote to memory of 520 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 31 PID 1392 wrote to memory of 520 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 31 PID 1392 wrote to memory of 520 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 31 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 PID 1392 wrote to memory of 952 1392 BALANCE OF NOV AND DEC 2022 PAYMENT.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BALANCE OF NOV AND DEC 2022 PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\BALANCE OF NOV AND DEC 2022 PAYMENT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\BALANCE OF NOV AND DEC 2022 PAYMENT.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AHVrZONRL.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AHVrZONRL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD7BA.tmp"2⤵
- Creates scheduled task(s)
PID:520
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e540ddad36509f05389a20a2e81833a0
SHA11900510c66ab3d77298a5f6e8579613f7ae1e997
SHA256bc8e7b626caf7aab6c3c54a0da8ea664e26fb19c6969616217fee3cf8cc528b0
SHA512718744d2666a7499611e98e88ce9343415af424e096c224c211ac4cfdff61bf17ef61178a808f70d6569bc4159cc2f599920c2c9ca8f879fb313076870db50f9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5IVXNVZBJXTYXOSY4GFJ.temp
Filesize7KB
MD5349b8873058087f7951f0002a899aa40
SHA182efdc2ef1eb7c0332e6440d19f71da285ee9fcc
SHA256e29e3ad0d052d9d989b01cb7f65432d93353bc0f1d931ebeb48b55c9e8a4a2a4
SHA51225d9b07082fb79be057fe329f2392a528c215d69ab8dfe737f6ab6ce05e1f739c0c080d877db04473bdbbbceef1ced3f8a45ac26b0e528ee37f41d12ae8eeab0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5349b8873058087f7951f0002a899aa40
SHA182efdc2ef1eb7c0332e6440d19f71da285ee9fcc
SHA256e29e3ad0d052d9d989b01cb7f65432d93353bc0f1d931ebeb48b55c9e8a4a2a4
SHA51225d9b07082fb79be057fe329f2392a528c215d69ab8dfe737f6ab6ce05e1f739c0c080d877db04473bdbbbceef1ced3f8a45ac26b0e528ee37f41d12ae8eeab0