Analysis
-
max time kernel
80s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30/06/2023, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Proforma Invoice.exe
Resource
win10v2004-20230621-en
General
-
Target
Proforma Invoice.exe
-
Size
1.3MB
-
MD5
0dcce5c54658fc8e2282b8f737e93be5
-
SHA1
622ed85d5cba99ac24d691b98b71ab7080074161
-
SHA256
eb2e0bf52e69c88784e19aef53a2c0330d3151ce8d448c5c45de44f3fc965aa0
-
SHA512
18307f094d771b865853a821bdb2f1dd885366208e44789787746e0a0b172e61597cb00b60c5e591a8c86aef17cf5241994659c1e92e6d9dc8c8354a876cd05f
-
SSDEEP
24576:uVp0K8s6owsmKZw2XXPUOgnwy45hbCbsfeHzYTuxa1y+ceBwDdplNMn0:uVp0K8s6owzInPUOgwy4fVWa1jceBw9D
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.steamd.in - Port:
587 - Username:
[email protected] - Password:
Purchase321@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 1616 2028 Proforma Invoice.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 524 powershell.exe 752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1616 RegSvcs.exe Token: SeDebugPrivilege 524 powershell.exe Token: SeDebugPrivilege 752 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1616 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2028 wrote to memory of 752 2028 Proforma Invoice.exe 27 PID 2028 wrote to memory of 752 2028 Proforma Invoice.exe 27 PID 2028 wrote to memory of 752 2028 Proforma Invoice.exe 27 PID 2028 wrote to memory of 752 2028 Proforma Invoice.exe 27 PID 2028 wrote to memory of 524 2028 Proforma Invoice.exe 29 PID 2028 wrote to memory of 524 2028 Proforma Invoice.exe 29 PID 2028 wrote to memory of 524 2028 Proforma Invoice.exe 29 PID 2028 wrote to memory of 524 2028 Proforma Invoice.exe 29 PID 2028 wrote to memory of 1780 2028 Proforma Invoice.exe 31 PID 2028 wrote to memory of 1780 2028 Proforma Invoice.exe 31 PID 2028 wrote to memory of 1780 2028 Proforma Invoice.exe 31 PID 2028 wrote to memory of 1780 2028 Proforma Invoice.exe 31 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 PID 2028 wrote to memory of 1616 2028 Proforma Invoice.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Proforma Invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wEQFNT.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wEQFNT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD49E.tmp"2⤵
- Creates scheduled task(s)
PID:1780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d0f799c3c09f2c1fb8707c0c1658f563
SHA1aced53084f2d5aeede2675ecbc04d9e26b06de63
SHA2569a5a3dedaf3b84eddbc40c05301d00186984af72d7c88107d26b57ba408297ba
SHA51248602827c04546fa3460fab603974a559650efa713337da53dbea216ed3e8ad0c5d47bf4c6a9c2108e8e5646674e0218bc36eab18913342ef8ced1fda9679d06
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SL7VZD1GXYYB9GKQ4Z8G.temp
Filesize7KB
MD505855fdae3d0469f386696c71ed6755a
SHA123659f1012bb97fee9076c32512b642db1a6bd21
SHA2569fe9419c817bc2aadd2634cd0b9e7b0cedc61f4620560b49ebc30080e27c002a
SHA512cd8bb418356a1591e7dfd2529248dad81aa6509e5ca790842cd4d31e4edc0583a3b309f6bfb9f0cb3255ab054d46b08f13429bea9c95154f115119f1393ae493
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD505855fdae3d0469f386696c71ed6755a
SHA123659f1012bb97fee9076c32512b642db1a6bd21
SHA2569fe9419c817bc2aadd2634cd0b9e7b0cedc61f4620560b49ebc30080e27c002a
SHA512cd8bb418356a1591e7dfd2529248dad81aa6509e5ca790842cd4d31e4edc0583a3b309f6bfb9f0cb3255ab054d46b08f13429bea9c95154f115119f1393ae493