Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win10v2004-20230915-en
General
-
Target
ORDER LIST_SEPT7FIBA00541·PDF.scr
-
Size
2.1MB
-
MD5
f553993c429df4169eccb3463ff291be
-
SHA1
6204264af92d6e1d31bd806ac9be14b105db422c
-
SHA256
c5d72b59daee806a6528a681f2aa98d4ee4a0c3b96b897e5b2e1cd591cc5d633
-
SHA512
93676a7857daecfc5b87cc73411c042c253e0f6c1fb51fd950e5c184e0c74311e7286d92d1a79ad82681eea2f47ea04809293494a10deb38657705cf8daf3ac0
-
SSDEEP
24576:L9dfiq2k1eAFH5Xid4ajgyMLX4g2RoH43bXc/TAvsmts31ycmuFw2+LY7:ak1FDYoHMRvsmC31yUaXL
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
ZCgD#w!TZ505!!@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation ORDER LIST_SEPT7FIBA00541·PDF.scr -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1188 set thread context of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 916 ipconfig.exe 4956 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 4256 aspnet_compiler.exe 4256 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr Token: SeDebugPrivilege 4256 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4256 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1652 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 87 PID 1188 wrote to memory of 1652 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 87 PID 1188 wrote to memory of 1652 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 87 PID 1652 wrote to memory of 916 1652 cmd.exe 89 PID 1652 wrote to memory of 916 1652 cmd.exe 89 PID 1652 wrote to memory of 916 1652 cmd.exe 89 PID 1188 wrote to memory of 2000 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 101 PID 1188 wrote to memory of 2000 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 101 PID 1188 wrote to memory of 2000 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 101 PID 2000 wrote to memory of 4956 2000 cmd.exe 102 PID 2000 wrote to memory of 4956 2000 cmd.exe 102 PID 2000 wrote to memory of 4956 2000 cmd.exe 102 PID 1188 wrote to memory of 3948 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 103 PID 1188 wrote to memory of 3948 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 103 PID 1188 wrote to memory of 3948 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 103 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 PID 1188 wrote to memory of 4256 1188 ORDER LIST_SEPT7FIBA00541·PDF.scr 104 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER LIST_SEPT7FIBA00541·PDF.scr"C:\Users\Admin\AppData\Local\Temp\ORDER LIST_SEPT7FIBA00541·PDF.scr" /S1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:4956
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:3948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4256
-