Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
new invoice.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
new invoice.exe
Resource
win10v2004-20231020-en
General
-
Target
new invoice.exe
-
Size
631KB
-
MD5
becf866a427725c60201053c7ad2fc2b
-
SHA1
d1349e123509e8ddb230f23f8d4f2459aa67e545
-
SHA256
64898357ce95b4c3c20b0e219efcf4d2f9c894f0e46160e11e49a54e3420b4e0
-
SHA512
9b0abc09c8629877e33d13a5c8d6d3819d0f8536b6dd4a4b819743deb525abf945ef14cd79c965978ed29ec6fd81cbaca2e96fb9cd97c067d7453fdc4eb11cb2
-
SSDEEP
12288:M6WHdn7wwCD7PRQZ9Y5NMGdk2bt+DwcZqgp/k6CIoM:MtHl0pH5QZ9PCJ+k8qWk6CDM
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
st an st a n j r 22222 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 api.ipify.org 44 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 4260 1836 new invoice.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 4484 4260 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1836 new invoice.exe 1836 new invoice.exe 4260 RegSvcs.exe 4260 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1836 new invoice.exe Token: SeDebugPrivilege 4260 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99 PID 1836 wrote to memory of 4260 1836 new invoice.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\new invoice.exe"C:\Users\Admin\AppData\Local\Temp\new invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 19803⤵
- Program crash
PID:4484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4260 -ip 42601⤵PID:4008