Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2023, 10:54

General

  • Target

    Servo purchase Order.exe

  • Size

    308KB

  • MD5

    b7e5714c9266e7852db0d529c14922ec

  • SHA1

    db34aa46af23c3f2b7a2d72765548bb39d2f18f7

  • SHA256

    2de86403327aa376007b509984b68b8bde19279366e80aed50d39593cd495769

  • SHA512

    2e95fdd96c98d33b8dd3bdeba2782368c8674482c2d912c62fa6323a56e65c0abe61f93b7dc168d2a15459dc65bb5b8761ba55eeb3b3bdee5b8c5915889b392e

  • SSDEEP

    6144:PYa6qlmwy1hmtJ1Xim4Ijqgq+52wOGSx7M9W8z6WFsUAvbLBxYV85r3b:PYMHy1Ety5IjJq+56FcW8zDFe3BxL5rr

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Servo purchase Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Servo purchase Order.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\olntyv.exe
      "C:\Users\Admin\AppData\Local\Temp\olntyv.exe" C:\Users\Admin\AppData\Local\Temp\bhpdraaktk.nsk
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\olntyv.exe
        "C:\Users\Admin\AppData\Local\Temp\olntyv.exe"
        3⤵
        • Executes dropped EXE
        PID:1744
      • C:\Users\Admin\AppData\Local\Temp\olntyv.exe
        "C:\Users\Admin\AppData\Local\Temp\olntyv.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1728

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bhpdraaktk.nsk

          Filesize

          7KB

          MD5

          5bec7658958fedd6542caa6a04239c82

          SHA1

          53b0e50bef3474b3c691b43a75773575abdb942e

          SHA256

          c20c4453f5965fc14c2f3189421ed5723c8ce37c31231ea443242fbb0f973290

          SHA512

          7c671c147a059cfa6b95dfc7bb100d303bbc35cc0c9d18562ff4cf6fb7166c15c3c5a88acbe5fd3a46596b64847b36e2d1e0c39e40d7faa79e9bed8a6e0fe9b3

        • C:\Users\Admin\AppData\Local\Temp\neblnddfg.c

          Filesize

          262KB

          MD5

          eb3c4d8c20362788ca249dd002d2cfea

          SHA1

          d93777c9fdf5e4bb9716dffc419e11971b222d2b

          SHA256

          f83fb5de7098c58766cb4bf282418e74b79cb2cb758d9ba3e6b10e2fbd102f12

          SHA512

          581b322079755b370c4937834eab8bd27fecc6f516d47516df2c8c8c1363b09c14333d81ef9d714db5e590947f52aad41cd6aaba3cdc7903316b97f0b1e5874a

        • C:\Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • C:\Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • C:\Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • C:\Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • C:\Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • \Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • \Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • \Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • \Users\Admin\AppData\Local\Temp\olntyv.exe

          Filesize

          99KB

          MD5

          ad4b496a23dc9bc3829aff3e82cf8699

          SHA1

          3d118de55a2c040f10e82fb14682efb1e8640658

          SHA256

          8621cae16031dff48e76fd9f82e9ce91ed6b648a5df65b950b4c04d18bd2622c

          SHA512

          d7cf6f3a7246aaa015ee18108571886a834bb419ac47218724382860d394c11c637fdc77ebd7ef8990d642977d85b4a9b131501cfa471f185c99d7b96dc1603a

        • memory/1728-72-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/1728-75-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/1728-77-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/1728-78-0x0000000000CE0000-0x0000000000D20000-memory.dmp

          Filesize

          256KB

        • memory/1728-79-0x0000000000350000-0x0000000000380000-memory.dmp

          Filesize

          192KB