Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2023 06:48
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20230220-en
General
-
Target
New Order.exe
-
Size
330KB
-
MD5
af91bd1a0af069b39b3293dcd50bd4fa
-
SHA1
9ff4d3d6a7f355d9114dfccd620c614ab4b2632e
-
SHA256
97ad8dbd6e1db83248c8ca803510f18477375e1b5ef37d7cf2811ff565346c09
-
SHA512
ca7289f92b3f0c1865eb3c537ef1580860c59af744656461c7d22487be0500ecbd75b93c29ecf82ffd4eae3e1556759db1562f7260944ddbeb1931224f5ea734
-
SSDEEP
6144:wYa6RQq1CWmEkBpbf5VNuFOuvsWn4LVpikZ4jKyxza0Q8QvNn:wY3rADN4b5nWLKjR9W9
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 1996 New Order.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 888 1996 New Order.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 888 New Order.exe 888 New Order.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1996 New Order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 888 New Order.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1996 wrote to memory of 888 1996 New Order.exe 28 PID 1996 wrote to memory of 888 1996 New Order.exe 28 PID 1996 wrote to memory of 888 1996 New Order.exe 28 PID 1996 wrote to memory of 888 1996 New Order.exe 28 PID 1996 wrote to memory of 888 1996 New Order.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 New Order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5bee196a3b95f6e1a6eb37c56b41bc271
SHA1fff29a2baa7eb4a8b784140071275863b6ae3c61
SHA256018f22c7760b32d5d936d02cb62df9bb29242ed2c1820385844cb751f4425d61
SHA512de2c39610ff1d3bc25449bc56647af59d782296eb9374aa2a2fd3a43beb118a8350d34aa1d5256f39671c7bb74eceae4788739835278337a153232a5540bc6af