Analysis
-
max time kernel
63s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 14:21
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20230220-en
General
-
Target
New Order.exe
-
Size
1.1MB
-
MD5
689c1747e952be68eeaa28ecf3e36a90
-
SHA1
2c3c22cb6fc8c949f06b6c7b3e032776cc247bd1
-
SHA256
e0e1212ebf49244da1fd93d30b121e936b46d03b9879924a63402de69e225e2b
-
SHA512
82c7d63e730bc10ab2dc4648d512385d89b5af293168b4344d08688fffbf9e49ba7c4a999a9cd88d489c6c1c21578d78f2ebdd5a4d4d0e94a7ddfbc39561cbaf
-
SSDEEP
12288:d2iNo3XdJVZz5dB3HWXtLUphPCI0EGpF+fasTi6dsCM6D1IlnOh4HSlG+5q6waGd:d12zVZ97HW5ko29ZTT+Yb+HqM60cq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
New Order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
New Order.exedescription pid process target process PID 1344 set thread context of 912 1344 New Order.exe New Order.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
New Order.exepowershell.exepowershell.exepid process 1344 New Order.exe 1344 New Order.exe 1344 New Order.exe 1344 New Order.exe 1344 New Order.exe 1344 New Order.exe 1344 New Order.exe 1344 New Order.exe 1312 powershell.exe 1164 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
New Order.exeNew Order.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1344 New Order.exe Token: SeDebugPrivilege 912 New Order.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 1164 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
New Order.exedescription pid process target process PID 1344 wrote to memory of 1312 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1312 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1312 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1312 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1164 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1164 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1164 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1164 1344 New Order.exe powershell.exe PID 1344 wrote to memory of 1192 1344 New Order.exe schtasks.exe PID 1344 wrote to memory of 1192 1344 New Order.exe schtasks.exe PID 1344 wrote to memory of 1192 1344 New Order.exe schtasks.exe PID 1344 wrote to memory of 1192 1344 New Order.exe schtasks.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe PID 1344 wrote to memory of 912 1344 New Order.exe New Order.exe -
outlook_office_path 1 IoCs
Processes:
New Order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe -
outlook_win_path 1 IoCs
Processes:
New Order.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tiSwlXoCtZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tiSwlXoCtZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFAF3.tmp"2⤵
- Creates scheduled task(s)
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD539281140345bf0ceba2338a1fd9183bb
SHA15ca61c0bb34f0894a872954f96e99e1a16a15296
SHA256a071c36c821c6510391af7ff2bfa6654542a8f7449a7de2e2034f5819281bf54
SHA5126e002766a5c2d777b70a1de0b3148eafeff74afdac91e5586d0c9443de06f5b7569eb5f087c5b70b7445d6f21b89ba83e7a90de6382fe88f59f42209e08d3767
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\C17M1QIP36IEQVAUPKB1.temp
Filesize7KB
MD51590237943bb1b657de3aefe18d79896
SHA162a73b8da15aa45b829eb00cce334d9e78ca6284
SHA256c7c683e3cbbcb9fd2e8e2ebfa9a0213a43d460e371bc5725deddbd80d9c92078
SHA5123f8659847d2d4bbf0b2eab6e5b7b2e431ce65204912d55466276fbaacd4105fbb2ad7131076619c0b9837da13dc410d6098f702e9f0c36bf44d046c502a9fc17
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51590237943bb1b657de3aefe18d79896
SHA162a73b8da15aa45b829eb00cce334d9e78ca6284
SHA256c7c683e3cbbcb9fd2e8e2ebfa9a0213a43d460e371bc5725deddbd80d9c92078
SHA5123f8659847d2d4bbf0b2eab6e5b7b2e431ce65204912d55466276fbaacd4105fbb2ad7131076619c0b9837da13dc410d6098f702e9f0c36bf44d046c502a9fc17