Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 12:53
Static task
static1
Behavioral task
behavioral1
Sample
Yeni siparis listesi12042023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Yeni siparis listesi12042023.exe
Resource
win10v2004-20230220-en
General
-
Target
Yeni siparis listesi12042023.exe
-
Size
226KB
-
MD5
ecb9dc6ebe7fc72219f57876c166f4f1
-
SHA1
ffcd4db15cc11f2d49eed7d4c0252a7f8c41dc53
-
SHA256
df365b7013189762793dea193eb030ae8f7aed6ca14b5552ffd63a43508cbc6e
-
SHA512
5008f49fe2e8544091f853661bf23d3ed61a10d2a84de3270f1ca32e9da2fbd5d25f2d77ce3f5141614e7626bb2eec8fde17f63c21490becbb44a9ac52445789
-
SSDEEP
6144:NkG7hGpzhjfajfVUJLougeFU0J9/41mI:n7Mpz66LSXm/41mI
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6120421924:AAHfDg3lTzDUW4O1CSc9eyT6zf8UpaOZqyY/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 api.ipify.org 16 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4588 set thread context of 1836 4588 Yeni siparis listesi12042023.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1836 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1836 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 PID 4588 wrote to memory of 1836 4588 Yeni siparis listesi12042023.exe 85 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yeni siparis listesi12042023.exe"C:\Users\Admin\AppData\Local\Temp\Yeni siparis listesi12042023.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1836
-