Analysis
-
max time kernel
186s -
max time network
222s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order Featured Product Lines.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Purchase Order Featured Product Lines.exe
Resource
win10v2004-20230915-en
General
-
Target
Purchase Order Featured Product Lines.exe
-
Size
553KB
-
MD5
2fe5d36f267da6b072f024fc1436eb2d
-
SHA1
b801d35b137a16645692b86faeaa8ca39c9eda5d
-
SHA256
91a10a6ddbdd84c582c2cd618a659bee55d9da5f6b8a4b94241069958a710951
-
SHA512
222903258937feae6e13f8a3f5cbcda069dd4ed213c020866e85f8d7e83fd0f40642acc24ed07dc1d6e3bae7b6928216547590b57908e8050304e1df41c83e8b
-
SSDEEP
12288:atzX+Uw6SuNKR0f8gr2qgEcXQXX6sCC/4BNdWko72R4f2HPCU:atzDSuNKR0f8gr2q7ssCCAD872RPC
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sh003.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
splendour12.. - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2372 2720 Purchase Order Featured Product Lines.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2372 RegSvcs.exe 2372 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2720 wrote to memory of 692 2720 Purchase Order Featured Product Lines.exe 29 PID 2720 wrote to memory of 692 2720 Purchase Order Featured Product Lines.exe 29 PID 2720 wrote to memory of 692 2720 Purchase Order Featured Product Lines.exe 29 PID 2720 wrote to memory of 692 2720 Purchase Order Featured Product Lines.exe 29 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31 PID 2720 wrote to memory of 2372 2720 Purchase Order Featured Product Lines.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order Featured Product Lines.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order Featured Product Lines.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gVNdwqtecNzPlw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAADF.tmp"2⤵
- Creates scheduled task(s)
PID:692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50cf87939ed08d5ff957d15bd973ce501
SHA10ad8cf844e885e12f872925511fadb8a02c879aa
SHA25629858819628e357c0893817f5e2194f5289c4e95bc251b4ac9379155ee43e239
SHA512b96c1636645e4c37a6391c1d5356236bf42a6ced8aa89eb1f79a12268b369e3d49570f432b15803db62758a5b47fb94c58b1383609d8a3b46a91678a3293480b