Analysis
-
max time kernel
131s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2023 20:14
Static task
static1
Behavioral task
behavioral1
Sample
USD$46,860.00 All payments.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
USD$46,860.00 All payments.exe
Resource
win10v2004-20230220-en
General
-
Target
USD$46,860.00 All payments.exe
-
Size
638KB
-
MD5
c3f5d351824706c4a655c3759ab10afe
-
SHA1
8d72cc01c11767e3a7bbf711d4c958870114b215
-
SHA256
5c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838
-
SHA512
f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c
-
SSDEEP
12288:unlrEdwemEo8V5VnqU58iN82RCAP1L59rrCoh9zcL7ql1hYsSj:QlbiV5hP5HNhl1vCGC7Qb
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
rwziqmgfaoeffcdm - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 1596 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1672 cmd.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" USD$46,860.00 All payments.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 1520 1596 svchost.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 632 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1564 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1240 USD$46,860.00 All payments.exe 1596 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1240 USD$46,860.00 All payments.exe Token: SeDebugPrivilege 1596 svchost.exe Token: SeDebugPrivilege 1520 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1240 wrote to memory of 556 1240 USD$46,860.00 All payments.exe 27 PID 1240 wrote to memory of 556 1240 USD$46,860.00 All payments.exe 27 PID 1240 wrote to memory of 556 1240 USD$46,860.00 All payments.exe 27 PID 1240 wrote to memory of 1672 1240 USD$46,860.00 All payments.exe 28 PID 1240 wrote to memory of 1672 1240 USD$46,860.00 All payments.exe 28 PID 1240 wrote to memory of 1672 1240 USD$46,860.00 All payments.exe 28 PID 556 wrote to memory of 632 556 cmd.exe 31 PID 556 wrote to memory of 632 556 cmd.exe 31 PID 556 wrote to memory of 632 556 cmd.exe 31 PID 1672 wrote to memory of 1564 1672 cmd.exe 32 PID 1672 wrote to memory of 1564 1672 cmd.exe 32 PID 1672 wrote to memory of 1564 1672 cmd.exe 32 PID 1672 wrote to memory of 1596 1672 cmd.exe 33 PID 1672 wrote to memory of 1596 1672 cmd.exe 33 PID 1672 wrote to memory of 1596 1672 cmd.exe 33 PID 1596 wrote to memory of 1052 1596 svchost.exe 34 PID 1596 wrote to memory of 1052 1596 svchost.exe 34 PID 1596 wrote to memory of 1052 1596 svchost.exe 34 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 PID 1596 wrote to memory of 1520 1596 svchost.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\USD$46,860.00 All payments.exe"C:\Users\Admin\AppData\Local\Temp\USD$46,860.00 All payments.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:632
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE2D1.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"4⤵PID:1052
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1520
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD59ac7fb5010b4f25cd4c6fb0ac9da708e
SHA1cc8ca9af6acacbf68aacf6f843cc92592e848f47
SHA256aa45b75fe1872598b9719c56f56b39b8e0c03ce99ac7870b12aa62bb30e6e2e4
SHA51285b67208dba726a067ce2cd6ab41ed3ad4fc19827b5f4cb00e9eb7751ddcc1e0f235b02634ee1660a60fe18a3cc4fbebef4c011f4ca05d321b129a7bcd933804
-
Filesize
151B
MD59ac7fb5010b4f25cd4c6fb0ac9da708e
SHA1cc8ca9af6acacbf68aacf6f843cc92592e848f47
SHA256aa45b75fe1872598b9719c56f56b39b8e0c03ce99ac7870b12aa62bb30e6e2e4
SHA51285b67208dba726a067ce2cd6ab41ed3ad4fc19827b5f4cb00e9eb7751ddcc1e0f235b02634ee1660a60fe18a3cc4fbebef4c011f4ca05d321b129a7bcd933804
-
Filesize
638KB
MD5c3f5d351824706c4a655c3759ab10afe
SHA18d72cc01c11767e3a7bbf711d4c958870114b215
SHA2565c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838
SHA512f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c
-
Filesize
638KB
MD5c3f5d351824706c4a655c3759ab10afe
SHA18d72cc01c11767e3a7bbf711d4c958870114b215
SHA2565c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838
SHA512f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c
-
Filesize
638KB
MD5c3f5d351824706c4a655c3759ab10afe
SHA18d72cc01c11767e3a7bbf711d4c958870114b215
SHA2565c98f2049c63db553be8fa363503970a5dddc57966148d123c6b12ca17dc9838
SHA512f869cefbed645ff12e09dd2c4655f11dedc0710c1e452dbd2a83bdda44567865ac0ea2ee76f42d4151b76ca71e83806835b118455fdfa8c4c61767d602a29b3c