Analysis

  • max time kernel
    97s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2023 11:01

General

  • Target

    Purchase Order 4500039272 Approved.exe

  • Size

    347KB

  • MD5

    5cef4d15bae43132b36b2db81601aa16

  • SHA1

    58ad81c84ec579dc5e15b1b84a4939d398f97481

  • SHA256

    9f468e738ac7218f377e20302bedf378c573b15e54f46b786e4a6b5a2081fc8b

  • SHA512

    33ff6dbb8e0abe7af5951abcf820f162b718825f716038c22c15f552f1a83097d32ed36f616f9b9a26859e4afcefaa86508b8ffbff1b3748fb08b78ae960588f

  • SSDEEP

    6144:p0T5IUfFhkWbNyNffNfcTyg4XQdzQ9A185RDhq+2t55VEub:ppUthk2YNiegnzJ1ADhq1/9

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order 4500039272 Approved.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order 4500039272 Approved.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2108
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2604
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order 4500039272 Approved.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order 4500039272 Approved.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2072
  • C:\Windows\SysWOW64\ipconfig.exe
    ipconfig /release
    1⤵
    • Gathers network information
    PID:2312
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1fe8bab5dde3ecdb0246ba6ad1e082e

    SHA1

    006df2f396dc4ee85b2842e1b1b65de27cbd8592

    SHA256

    e5f642c02b3f4a8c4ee6ea19d26d2d95fd4d59618ff78f17c3c6fe8545e25e31

    SHA512

    af735207adf481eca6f8d7469ff9d71d2568a955504f7c2e89094997ef3e7f9fd30f06ca712756649af0bcefa460cbb09c3d487a204a83fe540ee865b65a8166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86a8a21b55f6063329964d7e4e784dc1

    SHA1

    534d0caabac98290821ee5ef13742bf2e8f9229a

    SHA256

    cf21f5f2f9e53ddc011ccb87b3fe9725825cfefa7ced5352af19663d8e1cac2f

    SHA512

    8837898c85ffb8f95465ba19f6b3bef18712ef02b2085d39f97b0f1510a446039cbf8bf9482c0cf74e1e1fb6f8e9bae5a966c909d40bd0c429102cf7339872d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e9f67ebe67d3547535ed275b2a473ef

    SHA1

    60f20c463434b088621e1a5cf310b2bdcf4e20a5

    SHA256

    1ef99c22b9a02019283aae46d6fb694ae61545aba26f7ca501535abe4e67f7b6

    SHA512

    5232b28e2f0f8bded6bd78b5cdeb8cb9e04bc6aecfa7c944bf2162692825e6f0a1f12e55429d6eebddf0d888b57d6a2354c830f53bd37b46d60ad3beccd8632b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86de0dba67656c1b81a54921e799f5a4

    SHA1

    141ae1cf4f8106d6ffb7c00db1a4d361315976a0

    SHA256

    3d62eea79c0664e78b1c30f1e16cd019d0acfaffb34142ddca4bf99bf24c992d

    SHA512

    1e3c45e2285ebcef9847ad0156589cc8a150b83dd3e293619fc763cca4337ed6ff6ea300b5a9160de6adc0ee9bab7d31764d812f58795c4261a7955baea58894

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    254d8b05bd7ed779eceec804828546ac

    SHA1

    5b9d923d60badf8bc1395f3cb322bece0debe77c

    SHA256

    79b7ce231b496486d92a0657e320cf39505984f5cb958ced86fa766470f5adda

    SHA512

    64b9b81847a775f1ea0bfc555bc4fdb638f04ecf89a192d4300535f587130399764000fff40fefc1ab4843c51f0584dcdd436c8c9713fef88a6f2455b01f2a13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af153b77c5ef82e239583d23c6acd286

    SHA1

    20c25846899393db39412c1c61e9bc715b13334f

    SHA256

    42a5d1503d9544b99aa8cc759f303a3214c06246ea4bdc6eb650bef5e59dcc1d

    SHA512

    183cd45ebac0775bc1086e8995593dc26302b41c52f0fd751522d291ed868a31cb2d6b5cb3be07aa9eaaa84397f4330914a2ea1766e2ee1e31bdced6ded83e14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    87339bee3455624caa6f8f1db138d646

    SHA1

    446f585236c0a0c6e9b9a584b2d323570796784f

    SHA256

    9b12f6fa7cf0d3d7b782ddd997812ba75b25929db7c09dbb12e3c54ac24e2b8b

    SHA512

    f8932ddf45fef16053543d1c105fb1aca5530ad7a8fd2284e2993946cd74022f606e866d97d05c59962624a005411f3e9f7b23f842961b5aa9910306082b9b4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    896d204277c65602ceaaaa769e3ed1a9

    SHA1

    9fd0466194a08f74fd32e35c7e91ca3de2fbca53

    SHA256

    2aa1c8bbfa32d82390c24dcee145f02e22bd461e4369f435f52f27146ff39db9

    SHA512

    d884529e2ea954ceeb1e445d7952a71da0c9c193c7622368082990638db9089567e20a31dc8b6588275c411e152fb61532034ed0a2cd663c9c755819328a87e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4d26fe740ae8ddfdda48a3b4a49c02f

    SHA1

    6bfb6fa640ac0af7fd28158eabf482d027b3de4a

    SHA256

    1e8fc97850448941af060304ee927e7c3eabd9e5566244bfd3238a24243c2ecf

    SHA512

    88e59a690d776c60bf7c96b489c34faa0c5a1d8b089be7c77d184c313ab8ffdd8f54a255f260d46484a1afddd9db96702d57dd2689d77d454b16a8243a772d2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6de75e478e8ee59198004338fe0054c

    SHA1

    d445c0e3abe22e8315ab1b8d4d27777ceb3655d4

    SHA256

    196add2d5457ccba6eecb825c10b6c8e5411b9123536306b20d2e2a373501a8d

    SHA512

    f4b35b5db14f5f1e9f1cd47af3b4246309f52ab551954de484c905941608142442ec7a8b33b680946b0cd6de8cd6480665fd56f2a436fc2e08f5f3d7dc777518

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93e18d7794043e974f805de744c99d82

    SHA1

    bb17d8f9d025e03f9df2412202d6634558470fae

    SHA256

    fe613da0b7e7418f25b6fdfaa2ce2a2cd41246cf9d89cea957c938859129e259

    SHA512

    a1d5f8d50eb2af09f733d9cd32e339ad4f02f4ecd22faca3da8d295b50f4b95bb8cebe1cca377b34c2a6e333bc7c61ab784e2ccb340e5ec8159520d6c76f0d0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b3d1ffddcea440efe1d9b39b3daf4fe

    SHA1

    075fba769acdfba7c77ffa10dfd3764f84f43a92

    SHA256

    a926a2171666cf1d28f0917a8b0e98923ec387a8c0683429c753ded27036fb2f

    SHA512

    d8a185757fc71dfe7719b88d03c9f261565d834c370db52f195e15f18921d9e79f3e3b6bfbd6bcdac5758ef71ce26fe7d1a93562e0d336d24677b3990116d382

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b31774cde6bbd9a7f87f18f48acce166

    SHA1

    9ad85ea309b00f52feef7ca765db95e27dc7f46c

    SHA256

    d0be9bafed1f1ec32a6419b723a32a4a7cd41784d1750063deba57b6c3d805f7

    SHA512

    a9a0b80ba195abec7d1f53882c172292e55abe3bff5de10894433b365b9f8eca577cfe2d42234099b8697aa1a86512e1426417c0576bf0596216d5d20a2d1472

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f3b0c8e17eaaaa1409b17f0029a4b60

    SHA1

    f8dfcf7afbf525d572f4472b321d9820c149bc79

    SHA256

    540b89a22283d6ca610bbc7244c518f03e2d82250beab64b008d2bad564deb58

    SHA512

    2ec6db8a78a8371896c3f3c7f9f26a3f8ae3553ad48dca5f2bb8c3ad6266e550696949cf7025468b295c97412acaa702c61022d1245ed63cc2fbcb1ce299e11f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd5b14899d64e8460ffb7c1064de4069

    SHA1

    a7f3445c1debf345bdbc1446dd45f4c639fb6d65

    SHA256

    bc0fc62817765710f75b365663c2583f4ff4a0b99cf498fff2ce3c15dd9a8f06

    SHA512

    647401db463bbb9dd024696e0e4c5f977e1b04daf31d24f1031635bd2e12fac7674be3a8af50c21974f0e8f5b75a154c40d81d1400f2c4005298692e17e25e26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f5441c39ce441a2176df36dbb589bf6a

    SHA1

    b69716fdae9802fad49b4714682f8813187cdd94

    SHA256

    6c8e49d8344c7d2bc3fc5ffaea1d16638b3bcc16914f73b92207970a8eaf10bf

    SHA512

    82966313d80d68a4ca9da6095ce90f46d4fbed22b0c0649434752555285dc848b094007dc2094841032cc5a9828417e3043ff9f728dfb87f67c8f733eb436f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b02878a8baba710cc585f6d4bcbc5e68

    SHA1

    2b1aab1cba3a44543663d10ceafa71429a1acd47

    SHA256

    69ccf9c8a887984f22314a20d195e3ed801808ef418f8c552540dd5481003a35

    SHA512

    7ea437aa2d90a499865bf055ff29ce279998625b6f305694fc44df36a8ebe06bb835e6af097a1a0ce4280452f2f0ffb00198e1573955ebbd69233161057ae7b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aac172af914ae07cca8cd6ada95d9864

    SHA1

    56ee5cbd73b3c604b7af7b53281a3389369483e1

    SHA256

    fc5103b52dab89d91ee0933216813e124b420cc1b09dccd4693a0568c5766503

    SHA512

    d0694d48e7ce6745773378855a21c8b532e7d6453c05ac83191197e48bdafca8a2c4362a41c13fd4ecb6fb75f8acb1241563d74e5e842f523e9c8a3a9c505dec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91de6bcf24efcfff43638b024717f02c

    SHA1

    ffb73060b92ab583c4a5cfb516b0fd4cd081bf04

    SHA256

    fa82aa4ce4be5626a9e68d020356dc4fc4f61a16b6f88877752d1b565e119e0f

    SHA512

    ced42ea74589c1fa191de391234a6eaa57be0910de658b9a522394959c9ab77025f665461373e9bfdc7eae62b6628f2a035190a6a214138b4ff9c781fc6c5f63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0438887cb0f47d18af6644067fd4b0e7

    SHA1

    186cfae3667fe7ab2de8c40c0b97c296257aaf0c

    SHA256

    9863b929cc27779149c3d30d7a2aaf0dfd5cd6074b7d3a472c5fc02596d10455

    SHA512

    a8a258b476b78fdb20c5826fc8165a45e5b5c95ad4be86dd62d3de1a54b18c58a76d4381fc2e62d52c3874f73854bf769989227a147ea21e7e5f664ecf00ce2f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\occ2pb6\imagestore.dat

    Filesize

    5KB

    MD5

    25c7e2cbdab29e9bc9273c6882e710de

    SHA1

    f65cd5498dbbbe3fb85487f483d0433868092bd6

    SHA256

    d17cbefe1344dbfcddef2e537fb9e971c38ecc49811c1fbe7e1fe649e2cea5f5

    SHA512

    75da329bc2ea699c13c33205834ef3c9f08734376fb49c4dba982ccafd08e627b21ec2dc0235e7656c7b76ef27ba4b659f2138097f854ac57e1154527c8cefe8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PBZ1TWUW\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\CabA4CA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarA4C9.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2072-90-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-88-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-532-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/2072-92-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2072-94-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-531-0x0000000074180000-0x000000007486E000-memory.dmp

    Filesize

    6.9MB

  • memory/2072-97-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-100-0x0000000074180000-0x000000007486E000-memory.dmp

    Filesize

    6.9MB

  • memory/2072-101-0x00000000049C0000-0x0000000004A00000-memory.dmp

    Filesize

    256KB

  • memory/2072-99-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-86-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2072-84-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2080-14-0x00000000001F0000-0x0000000000230000-memory.dmp

    Filesize

    256KB

  • memory/2080-13-0x000000006F2F0000-0x000000006F89B000-memory.dmp

    Filesize

    5.7MB

  • memory/2080-15-0x000000006F2F0000-0x000000006F89B000-memory.dmp

    Filesize

    5.7MB

  • memory/2080-12-0x000000006F2F0000-0x000000006F89B000-memory.dmp

    Filesize

    5.7MB

  • memory/2268-7-0x0000000074200000-0x00000000748EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2268-0-0x0000000000D60000-0x0000000000DBC000-memory.dmp

    Filesize

    368KB

  • memory/2268-8-0x00000000042D0000-0x0000000004310000-memory.dmp

    Filesize

    256KB

  • memory/2268-96-0x0000000074200000-0x00000000748EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2268-6-0x0000000000B40000-0x0000000000B8C000-memory.dmp

    Filesize

    304KB

  • memory/2268-5-0x0000000000680000-0x00000000006C0000-memory.dmp

    Filesize

    256KB

  • memory/2268-2-0x0000000074200000-0x00000000748EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2268-4-0x0000000000280000-0x00000000002C2000-memory.dmp

    Filesize

    264KB

  • memory/2268-3-0x00000000042D0000-0x0000000004310000-memory.dmp

    Filesize

    256KB

  • memory/2268-1-0x0000000000AE0000-0x0000000000B3A000-memory.dmp

    Filesize

    360KB