Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/06/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 11013.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order 11013.exe
Resource
win10v2004-20230220-en
General
-
Target
Purchase Order 11013.exe
-
Size
103KB
-
MD5
aec8743883c8342e2836d89cd38f7294
-
SHA1
4dd7b5b6130887d528926ae35ef316357a1d6e27
-
SHA256
44700efabdbbe386e2e689d0de94da92133cd2c36effe104ea5e8dc81a87fa5c
-
SHA512
330773f0b0a0a860b403211ee972645a992b31acb8a6a21549b19b446689686030f8a1545379e3edd23fdd803f1d0333fd66cf4daddc8b7ba2af8ae4d9fc774d
-
SSDEEP
768:YNLE6ewSRmSTY94dWN2P7b1IzPrXMkN336DX2AA:KE6ewSDY94du2PmfMkN3KDmAA
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6171107032:AAGnuLkWapUakrcrpegbgibDbN3r0phVBG4/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\Saete = "\"C:\\Users\\Admin\\AppData\\Roaming\\Wcznoftvokm\\Saete.exe\"" Purchase Order 11013.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1328 set thread context of 324 1328 Purchase Order 11013.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1328 Purchase Order 11013.exe 1328 Purchase Order 11013.exe 324 InstallUtil.exe 324 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1328 Purchase Order 11013.exe Token: SeDebugPrivilege 324 InstallUtil.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 1104 1328 Purchase Order 11013.exe 28 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 524 1328 Purchase Order 11013.exe 29 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 PID 1328 wrote to memory of 324 1328 Purchase Order 11013.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order 11013.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order 11013.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:1104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:324
-