Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Purchase order.exe
Resource
win10v2004-20230703-en
General
-
Target
Purchase order.exe
-
Size
442KB
-
MD5
17792def44307f4f2d0b1155abfe7448
-
SHA1
b3267c6c80a67e5ff1f53b0a2e3a5385ba405f1f
-
SHA256
2b54d7c7b0a36a01a6e738444491ec07595757248471a3618f52ee812c283eb3
-
SHA512
b507ab6eed713e357f4bed8907277023d932f50c89e14dcaa79e6e055ee23d32f76671359268ffbfb0be61e672fcde3015237d62d21e31e0aec7d5218002509f
-
SSDEEP
6144:AYa6RdzCeflCk3wh/PbNHaiGL1kos9GhamgcRk/dtujEwQug:AY5j9n3whh6ius4hHgLWyug
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6330881324:AAEdt0JSXujmBEMY7XuCXGEa5xSNtRZNq6g/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 2208 Purchase order.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe Key opened \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe Key opened \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2220 2208 Purchase order.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 Purchase order.exe 2220 Purchase order.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2208 Purchase order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 Purchase order.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 Purchase order.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2220 2208 Purchase order.exe 28 PID 2208 wrote to memory of 2220 2208 Purchase order.exe 28 PID 2208 wrote to memory of 2220 2208 Purchase order.exe 28 PID 2208 wrote to memory of 2220 2208 Purchase order.exe 28 PID 2208 wrote to memory of 2220 2208 Purchase order.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5f79f40c41655885edc3d9bafe6f6ef91
SHA11f95e51203c1f5dcb4f841664f45f1330834db41
SHA2565a01122d5da2499afb0014557aafe0f0e5b023332dcad16cae3037cd643fb6f2
SHA512d9e9a037e7b39a2bf05c7ec5e110c2c3e81f7b9839194d75b1915c91d795a743c354115ee8da664896aa8e27cbff63c4bca92b7a414d02e7c1e005e251960ba9
-
Filesize
68KB
MD5f79f40c41655885edc3d9bafe6f6ef91
SHA11f95e51203c1f5dcb4f841664f45f1330834db41
SHA2565a01122d5da2499afb0014557aafe0f0e5b023332dcad16cae3037cd643fb6f2
SHA512d9e9a037e7b39a2bf05c7ec5e110c2c3e81f7b9839194d75b1915c91d795a743c354115ee8da664896aa8e27cbff63c4bca92b7a414d02e7c1e005e251960ba9