Analysis
-
max time kernel
143s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
Remittance slip.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
Remittance slip.exe
Resource
win10v2004-20230703-en
General
-
Target
Remittance slip.exe
-
Size
372KB
-
MD5
758f5c1f99738cc2a59a385ce63e9a21
-
SHA1
22c825fcdc8c78a5f4339ae98754a423ba67a2a1
-
SHA256
b017455b50865cfdd26486b8c6d8348294ee6fba27ea97eb2d94e6a56b7397b5
-
SHA512
aca0e6800300b410a27dac7740981d5fa1711ca86c752855e0f23ad786931a2e92a507d3c57b880d8fbdbf947f7de58c80b1bb6d3dacb555abc28ca49ee2e491
-
SSDEEP
6144:/Ya65Gb4fu5qu5/9vkkq4Bd1QO8E2qtDAQMynxwAC+wNkm3iiI9kcZXUgApaYIno:/YDGbgu5qu5/9UWUO8EfkQBxK+weiWRw
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 2276 Remittance slip.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remittance slip.exe Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remittance slip.exe Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remittance slip.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 3064 2276 Remittance slip.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2276 Remittance slip.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3064 Remittance slip.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3064 2276 Remittance slip.exe 27 PID 2276 wrote to memory of 3064 2276 Remittance slip.exe 27 PID 2276 wrote to memory of 3064 2276 Remittance slip.exe 27 PID 2276 wrote to memory of 3064 2276 Remittance slip.exe 27 PID 2276 wrote to memory of 3064 2276 Remittance slip.exe 27 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remittance slip.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Remittance slip.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Remittance slip.exe"C:\Users\Admin\AppData\Local\Temp\Remittance slip.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Remittance slip.exe"C:\Users\Admin\AppData\Local\Temp\Remittance slip.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD571790b245a749637663468615cb6e1aa
SHA117141a074a308dc49d06ef02eb6f5e111125108a
SHA256c327f61755ca21c71aaa0745b3b1ea71f4f90f95709e64786c9c71dbc2f108d6
SHA512a557ab4a585297917e40e69a709ac334fc5ae35ea2c2ad92dba9c3f4fd29a1ffa19ea6653b5c1d6fcd924186b7500ccc014fab899971e02bde8b15798a204639