Analysis
-
max time kernel
75s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 11:07
Static task
static1
Behavioral task
behavioral1
Sample
Payment Swift USD45,000.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Swift USD45,000.exe
Resource
win10v2004-20230221-en
General
-
Target
Payment Swift USD45,000.exe
-
Size
701KB
-
MD5
2cdadb430d6398c3d479965903424159
-
SHA1
8178aa04e93d14c8c2edc4945bf3c7a7cbd94298
-
SHA256
971768aa9e6a82e0236f07d5d38e0b1d32f998619275b1b5c72b3d3540507a0b
-
SHA512
3361f46dd4bbbc2b197d1895d9fe8c622cff127f06581f283aa5c61de9598538360f2981ded126b418807db21f4bf01c1f93d0c9e23c4ca83e2d8ab3107426cc
-
SSDEEP
12288:HjHXmbxzUnxUn7bNVVebVyywVR0wKQQpf3Kws+js7bpP0XEP:7XmbCnWn+wVR0wjSfKwsIybpP0XEP
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.focuzpartsmart.com - Port:
587 - Username:
[email protected] - Password:
FpmJhn@2023 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Payment Swift USD45,000.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Payment Swift USD45,000.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Payment Swift USD45,000.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Swift USD45,000.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Swift USD45,000.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Swift USD45,000.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Swift USD45,000.exedescription pid process target process PID 4136 set thread context of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Payment Swift USD45,000.exepid process 4136 Payment Swift USD45,000.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Swift USD45,000.exePayment Swift USD45,000.exedescription pid process Token: SeDebugPrivilege 4136 Payment Swift USD45,000.exe Token: SeDebugPrivilege 3968 Payment Swift USD45,000.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Payment Swift USD45,000.exedescription pid process target process PID 4136 wrote to memory of 1088 4136 Payment Swift USD45,000.exe schtasks.exe PID 4136 wrote to memory of 1088 4136 Payment Swift USD45,000.exe schtasks.exe PID 4136 wrote to memory of 1088 4136 Payment Swift USD45,000.exe schtasks.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe PID 4136 wrote to memory of 3968 4136 Payment Swift USD45,000.exe Payment Swift USD45,000.exe -
outlook_office_path 1 IoCs
Processes:
Payment Swift USD45,000.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Swift USD45,000.exe -
outlook_win_path 1 IoCs
Processes:
Payment Swift USD45,000.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Swift USD45,000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Swift USD45,000.exe"C:\Users\Admin\AppData\Local\Temp\Payment Swift USD45,000.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AnHFnHzNv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFA53.tmp"2⤵
- Creates scheduled task(s)
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Swift USD45,000.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
1KB
MD565619e5b2dc5c28241d45c471483a459
SHA10e1d839af6d3ae13899d2cbd50d8628577cd6401
SHA2569249b7fc884c45855935babebfcb6b3698cb4b144069b3e9dc4bf574ec76f400
SHA51270db3889a7cbd6082d8bd373c0dd67d63c47b6748704f98c5c4076605619abec2ea0438c8ffd21c6e383a24854e801af5af93221b2028f763614c89d3c109766