Analysis
-
max time kernel
68s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2023 13:41
Static task
static1
Behavioral task
behavioral1
Sample
SIGNED ORDER.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SIGNED ORDER.exe
Resource
win10v2004-20230220-en
General
-
Target
SIGNED ORDER.exe
-
Size
562KB
-
MD5
3e6850965fa13f40e05a1c416d8f2681
-
SHA1
b2ab48d66b24f88d5cbc65b079f7d1ab3c0e9153
-
SHA256
866e30140fc553f94493a28cae2b615924240cba323fd08f95ee0c716f28ee0e
-
SHA512
3aa24481a5347a26113ccaea4b07779bee14f5251b2d4c936b14900c2c3069426d8596b60f5cae568c51abca9774588546199220a1bb874d693561e0f2c27644
-
SSDEEP
12288:2VVGksHlEMtZsODNXW8FKpQ+qEg3N/X7:UKlKODxFrEqN
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
modelinfra.com - Port:
587 - Username:
[email protected] - Password:
wY9;2=jgMwAj - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SIGNED ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SIGNED ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SIGNED ORDER.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 920 set thread context of 1884 920 SIGNED ORDER.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 920 SIGNED ORDER.exe 920 SIGNED ORDER.exe 920 SIGNED ORDER.exe 588 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 920 SIGNED ORDER.exe Token: SeDebugPrivilege 1884 SIGNED ORDER.exe Token: SeDebugPrivilege 588 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 920 wrote to memory of 588 920 SIGNED ORDER.exe 28 PID 920 wrote to memory of 588 920 SIGNED ORDER.exe 28 PID 920 wrote to memory of 588 920 SIGNED ORDER.exe 28 PID 920 wrote to memory of 588 920 SIGNED ORDER.exe 28 PID 920 wrote to memory of 1152 920 SIGNED ORDER.exe 30 PID 920 wrote to memory of 1152 920 SIGNED ORDER.exe 30 PID 920 wrote to memory of 1152 920 SIGNED ORDER.exe 30 PID 920 wrote to memory of 1152 920 SIGNED ORDER.exe 30 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 PID 920 wrote to memory of 1884 920 SIGNED ORDER.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SIGNED ORDER.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SIGNED ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SIGNED ORDER.exe"C:\Users\Admin\AppData\Local\Temp\SIGNED ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vywcmFCHE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vywcmFCHE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD0F6.tmp"2⤵
- Creates scheduled task(s)
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\SIGNED ORDER.exe"C:\Users\Admin\AppData\Local\Temp\SIGNED ORDER.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55dd7f6523a54aac1b5bc94988c3fe5e4
SHA1af13c8f83bb70a4ad6859534a22881101ebe2abd
SHA256f1cedf974aa4f7d7f59fc527a11e28c4d93a613a5d8343331b4e8ac927f94186
SHA512925065171165fc270d8df3d1e39a9a1763f3a5cc0ccebe9c99d0f62cd4819ee24b09d035fffc7a3b6d38f339af5bb4cfa7d7597707c9da64bc907c46f5be5b88